Chandan BhattacharyainCyber Security AdvocacyGuide to Cost-Effective Application SecurityAn article that provides insights on how open-source tools can be leveraged for cost-effective Application Security in organizations13h ago
Krzysztof PranczkinITNEXTDetecting Banker Malware Installed on Android DevicesThis article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the…Mar 202
cyb3rninj4Thick Client Security Testing: The Essential GuideIn this blog, we will discuss what are — Thick client applications, an overview of them, and my approach to testing thick client…Jul 22, 20231Jul 22, 20231
Krzysztof PranczkBroken Function Level Authorization — Web API Security Champion Part VExplaining one of the most common web API vulnerability classes — Broken Function Level Authorization in a practical manner. Providing a…10h ago10h ago
Krzysztof PranczkinITNEXTIntroduction to Security in SDLC with SAST for Developers and Security EngineersIn today’s landscape, automation plays a crucial role in various development activities, ranging from ensuring code quality and performing…Feb 23Feb 23
Chandan BhattacharyainCyber Security AdvocacyGuide to Cost-Effective Application SecurityAn article that provides insights on how open-source tools can be leveraged for cost-effective Application Security in organizations13h ago
Krzysztof PranczkinITNEXTDetecting Banker Malware Installed on Android DevicesThis article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the…Mar 202
cyb3rninj4Thick Client Security Testing: The Essential GuideIn this blog, we will discuss what are — Thick client applications, an overview of them, and my approach to testing thick client…Jul 22, 20231
Krzysztof PranczkBroken Function Level Authorization — Web API Security Champion Part VExplaining one of the most common web API vulnerability classes — Broken Function Level Authorization in a practical manner. Providing a…10h ago
Krzysztof PranczkinITNEXTIntroduction to Security in SDLC with SAST for Developers and Security EngineersIn today’s landscape, automation plays a crucial role in various development activities, ranging from ensuring code quality and performing…Feb 23
RAVI SHANKARHow to detect Polyfill[.]io on a websiteAt work, I manage a platform that hosts over 150 public websites. When the polyfill[.]io supply chain attack surfaced, we were initially…Jul 6
HCLSoftwareApplication Security Testing: Safeguarding Open-Source SoftwareSince their inception, open-source components have played a significant role in application development since their inception. Open source…1d ago
Florian WalterThe Easiest Way to Find CVEs at the Moment? GitHub Dorks!In this article, I will demonstrate how I used GitHub dorks to find 24 vulnerabilities in popular open-source projects in just a few weeks…Feb 85