Articles on developer guidance

Pentester's Guide to Evaluating OAuth 2....

Maxfield Chen   |     November 17, 2020

How to Test for Command Injection v2

Serge Truth   |     November 4, 2020

Repo Jacking: Exploiting the Dependency ...

Indiana Moreau   |     October 22, 2020

Computer-Based Training: October 2020 Re...

Jose Lazu   |     October 15, 2020

Attackers Love Your Password Reset Featu...

Harsh Bothra   |     September 2, 2020

Proxying Unaware Thick Clients

Maxfield Chen   |     August 5, 2020

The Seven Sins of Anti-CSRF Tokens

Harsh Bothra   |     July 29, 2020

Computer-Based Training: July 2020 Relea...

Jose Lazu   |     July 23, 2020

The Dark Side of Request Routing

Maxwell Dulin   |     July 7, 2020

Understanding, Detecting, & Preventing M...

Ben Stewart   |     June 11, 2020

Get the Newsletter

Every two weeks we'll send you our latest articles along with usable insights into the state of software security.

Posts by Topic