Fastly Subdomain Takeover $2000
Fastly Subdomain Takeover $2000 Bug Bounty — From zero to HERO by Alexandar Thangavel AKA ValluvarSploit WHOAMI My name is …
Read MoreAppSec Tales X | SAML
AppSec Tales X | SAML by Karol Mazurek Application Security Testing of the SAML protocol guidelines. INTRODUCTION The article describes …
Read MoreCybersecurity in Education: What Parents, Teachers, and Students Should Know in 2023
Cybersecurity in Education: What Parents, Teachers, and Students Should Know in 2023 In as much as we have to thank …
Read MoreAndroid Pentesting 101 — Part 3
Android Pentesting 101 — Part 3 by Vaibhav Lakhani and Dhir Parmar Welcome to Part 3 of Android Pentesting. This …
Read MoreRemembering Leonard Jacobs
We are deeply saddened by the passing of our course instructor and author, Leonard Jacobs. Leonard was a great professional, …
Read MoreCybersecurity Survey of LoRa and LoRWAN Industrial Radio
Cybersecurity Survey of LoRa and LoRWAN Industrial Radio By Leonard Jacobs, M.S. in Cybersecurity Technology, CISSP, CSSA This is the …
Read MoreIndustrial Control System Cybersecurity Threat Hunting
Industrial Control System Cybersecurity Threat Hunting By Leonard Jacobs, M.S. in Cybersecurity Technology, CISSP, CSSA Cyber threat hunting is the …
Read MoreNot usual CSP bypass case
Not usual CSP bypass case by Karol Mazurek INTRODUCTION During one of the penetration tests, I managed to chain three …
Read MoreA Pentester's Guide to JavaScript Apps
A Pentester's Guide to JavaScript Apps by Gilad David Maayan JavaScript is a programming language that began as a simple …
Read MoreAndroid Pentesting 101 — Part 2
Android Pentesting 101 — Part 2 by Vaibhav Lakhani and Dhir Parmar Welcome to Part 2 of Android Pentesting. This …
Read More