Articles on application security

Computer-Based Training: January 2021 Re...

Jose Lazu   |     January 22, 2021

Testing the security of NFC and RFID

Maxfield Chen   |     December 10, 2020

Hardware Root of Trust – Bios and UEFI

Maxfield Chen   |     December 3, 2020

FinTech Threat: The Malicious Insider

Ben Stewart   |     November 24, 2020

Pentester's Guide to Evaluating OAuth 2....

Maxfield Chen   |     November 17, 2020

How to Test for Command Injection v2

Serge Truth   |     November 4, 2020

Repo Jacking: Exploiting the Dependency ...

Indiana Moreau   |     October 22, 2020

Computer-Based Training: October 2020 Re...

Jose Lazu   |     October 15, 2020

Attackers Love Your Password Reset Featu...

Harsh Bothra   |     September 2, 2020

Proxying Unaware Thick Clients

Maxfield Chen   |     August 5, 2020

Get the Newsletter

Every two weeks we'll send you our latest articles along with usable insights into the state of software security.

Posts by Topic