Arief RahmanWhy PHP Is Often the Target of Exploits: Understanding the Loopholes and How to Anticipate Themby Arief Rahman (DevSecOps Consultant at ITSEC Asia)Nov 24
z3r0xk#01: Path traversalPath traversal (also known as directory traversal) vulnerabilities enable an attacker to interact with arbitrary files on the server…May 2
appsecwarriorHow To Series-Source Code Review- Part 1This blog series will guide how to become a pro in Source Code Review.Apr 2, 2023Apr 2, 2023
Arief RahmanWhy PHP Is Often the Target of Exploits: Understanding the Loopholes and How to Anticipate Themby Arief Rahman (DevSecOps Consultant at ITSEC Asia)Nov 24
z3r0xk#01: Path traversalPath traversal (also known as directory traversal) vulnerabilities enable an attacker to interact with arbitrary files on the server…May 2
appsecwarriorHow To Series-Source Code Review- Part 1This blog series will guide how to become a pro in Source Code Review.Apr 2, 2023
Pavel ShabarkinFinding SQL Injections through source code in .NET applicationsCodeAllTheThingsJul 8, 2022