Articles on application security

Computer-Based Training: January 2021 Re...

Jose Lazu   |     22, Jan 2021

Testing the security of NFC and RFID

Maxfield Chen   |     10, Dec 2020

Hardware Root of Trust – Bios and UEFI

Maxfield Chen   |     03, Dec 2020

FinTech Threat: The Malicious Insider

Ben Stewart   |     24, Nov 2020

Pentester's Guide to Evaluating OAuth 2....

Maxfield Chen   |     17, Nov 2020

How to Test for Command Injection v2

Serge Truth   |     04, Nov 2020

Repo Jacking: Exploiting the Dependency ...

Indiana Moreau   |     22, Oct 2020

Computer-Based Training: October 2020 Re...

Jose Lazu   |     15, Oct 2020

Attackers Love Your Password Reset Featu...

Harsh Bothra   |     02, Sep 2020

Proxying Unaware Thick Clients

Maxfield Chen   |     05, Aug 2020

Get a monthly digest of our blog posts