Articles on application security

Computer-Based Training: January 2021 Re...

Jose Lazu   |     January 22, 2021

Testing the security of NFC and RFID

Maxfield Chen   |     December 10, 2020

Hardware Root of Trust – Bios and UEFI

Maxfield Chen   |     December 3, 2020

FinTech Threat: The Malicious Insider

Ben Stewart   |     November 24, 2020

Pentester's Guide to Evaluating OAuth 2....

Maxfield Chen   |     November 17, 2020

How to Test for Command Injection v2

Serge Truth   |     November 4, 2020

Repo Jacking: Exploiting the Dependency ...

Indiana Moreau   |     October 22, 2020

Computer-Based Training: October 2020 Re...

Jose Lazu   |     October 15, 2020

Attackers Love Your Password Reset Featu...

Harsh Bothra   |     September 2, 2020

Proxying Unaware Thick Clients

Maxfield Chen   |     August 5, 2020

Get the Newsletter

Every two weeks we'll send you our latest articles along with usable insights into the state of software security.

Posts by Topic

View Full Topic List