Articles on application security

FinTech Threat: The Malicious Insider

Ben Stewart   |     24, Nov 2020

Pentester's Guide to Evaluating OAuth 2....

Maxfield Chen   |     17, Nov 2020

How to Test for Command Injection v2

Serge Truth   |     04, Nov 2020

Repo Jacking: Exploiting the Dependency ...

Indiana Moreau   |     22, Oct 2020

Computer-Based Training: October 2020 Re...

Jose Lazu   |     15, Oct 2020

Attackers Love Your Password Reset Featu...

Harsh Bothra   |     02, Sep 2020

Proxying Unaware Thick Clients

Maxfield Chen   |     05, Aug 2020

The Seven Sins of Anti-CSRF Tokens

Harsh Bothra   |     29, Jul 2020

Computer-Based Training: July 2020 Relea...

Jose Lazu   |     23, Jul 2020

The Dark Side of Request Routing

Maxwell Dulin   |     07, Jul 2020

Get a monthly digest of our blog posts