-
How an image compression feature can lead to XSS
-
A CTF writeup about solving 6 challenges in 5 minutes
-
A basic introduction to Java insecure deserialization and and how attackers can exploit this vulnerability to get RCE
-
How interoperation between the JVM and native code can create security issues
-
I decided to create a Yara rule to detect a malware: some things you may find useful about the processYara Shikitega Linux malware Reverse engineering Created
Mon, 06 Feb 2023 13:35:47 +0100 by Cesare Pizzi -
What is a prototype in JavaScript and how this useful feature can lead to security risks