-
Uncovering the unexpected behaviors of JavaScript strings and the challenges posed by UTF-16 encoding
-
While modern defenses have made CSRF vulnerabilities more challenging to exploit, emerging techniques still pose significant threats
-
Let’s take a look at the most common OAuth2 misconfigurations that can lead to vulnerabilities
-
Exploring security risks in a ‘Secure by Design’ and modern transport protocol
-
Legit features often turn into something unexpected: an Insomni’hack Teaser 2024 challenge writeup
-
RSA is an old but still secure public-key cryptosystem. However we need to know how it works to avoid mistakes that could introduce vulnerabilities..
-
Inside the Hex-Rays CTF Challenge and the “mysteries” of RSA
-
How HTTP/2 capabilities can be used to uncover Web race conditions
-
Using semgrep to write custom SAST rules and prevent vulnerabilities in your code
-
Playing CTF competitions to learn new stuff and discover hidden and powerful features