InITNEXTbyLucas SoaresOutSystems Security: TOP 3 Vulnerabilities that are the developer’s faultShould I read what this Lucas Soares guy wrote in this article?Nov 5
InDark Horse LabsbyShreyas BhondveLow-Code Platforms and Attribute-Based Access Control (ABAC): A Comprehensive OverviewIntroductionNov 4
InITNEXTbyLucas SoaresOutSystems Security: Feedback App is extremely vulnerable.or those of you who don’t want to read the entire article and still want to stay safe, I have a question: Is the Feedback App active in…Aug 182Aug 182
Lucas SoaresOutSystems Exploit: 2 things you need to check now in your application, for security.How does it feel to know that someone with the URL of your OutSystems app can find some very useful information to hack it?Feb 181Feb 181
InITNEXTbyLucas SoaresOutSystems Security: How did a demo user gain access to the backoffice?Imagine the following situation, someone accessed the backoffice application and made harmful changes to the settings; Then, support…May 7May 7
InITNEXTbyLucas SoaresOutSystems Security: TOP 3 Vulnerabilities that are the developer’s faultShould I read what this Lucas Soares guy wrote in this article?Nov 5
InDark Horse LabsbyShreyas BhondveLow-Code Platforms and Attribute-Based Access Control (ABAC): A Comprehensive OverviewIntroductionNov 4
InITNEXTbyLucas SoaresOutSystems Security: Feedback App is extremely vulnerable.or those of you who don’t want to read the entire article and still want to stay safe, I have a question: Is the Feedback App active in…Aug 182
Lucas SoaresOutSystems Exploit: 2 things you need to check now in your application, for security.How does it feel to know that someone with the URL of your OutSystems app can find some very useful information to hack it?Feb 181
InITNEXTbyLucas SoaresOutSystems Security: How did a demo user gain access to the backoffice?Imagine the following situation, someone accessed the backoffice application and made harmful changes to the settings; Then, support…May 7
Lucas SoaresOutSystems Security: (IDOR) How to hack your application’s Update?This is a common vulnerability that is present right now in several OutSystems applications, and the error lies with the developer!Feb 281
InITNEXTbyLucas SoaresOutSystems Scan — See if your OS app is vulnerable.How I created the first public tool for security analysis in OutSystems applications.Apr 28
Lucas SoaresOutSystems Security: UltimatePDF the forbidden peephole 403.What if I told you that the UltimatePDF component can be used as a peephole to see what’s on the other side of a forbidden door?Feb 251