Stand Your Cloud #3: AWS Provisioning and Access Requests
Nov 14, 2017
By Gerben Kleijn
A Bug Has No Name: Multiple Heap Buffer Overflows In the Windows DNS Client
Oct 10, 2017
By Nick Freeman
Is CORS Becoming Obsolete?
Sep 6, 2017
By Tim Sapio
Hot New ‘Anonymous’ Chat App Hijacks Millions of Contact Data
Aug 28, 2017
By Zach Julian
Breaking Drone Defenses: Using Chicken Wire to Defeat Net Projectile-Based Products
Aug 3, 2017
By Francis Brown
How I Built An XSS Worm On Atmail
Jun 23, 2017
By Zach Julian
How We Can Stop Email Spoofing
May 23, 2017
By Alex DeFreese
The CIA Leak: A Look On the Bright Side...
Mar 8, 2017
By Dan Petro
In the News: A BGP Hijacking Technical Post-Mortem
Jan 18, 2017
By Zach Julian
A Guide to Do-It-Yourself Network Segmentation
Nov 30, 2016
By Cory Johnson
Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player
Aug 10, 2016
By Dan Petro
If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data
Apr 8, 2016
By Joe DeMesy, Shubham Shah, and Matthew Bryant
Burp, Collaborate, and Listen: A Pentester Reviews the Latest Burp Suite Addition
Feb 3, 2016
By Max Zinkus
Fishing the AWS IP Pool for Dangling Domains
Oct 7, 2015
By Matt Bryant
Stand Your Cloud #2: Host Server Hardening
Sep 23, 2015
By Trevor Lawrence & Ruihai Fang
The Active Directory Kill Chain: Is Your Company at Risk?
Sep 8, 2015
By Kevin Sugihara
ColdFusion Bomb: A Chain Reaction From XSS to RCE
Aug 27, 2015
By Shubham Shah
An Overview of BGP Hijacking
Aug 17, 2015
By Zach Julian
On the "Brink" of a Robbery
Jul 28, 2015
By Dan Petro
Rethinking & Repackaging iOS Apps: Part 2
May 4, 2015
By Carl Livitt
Vulnerable by Design: Understanding Server-Side Request Forgery
Apr 18, 2015
By Mike Brooks
Rethinking & Repackaging iOS Apps: Part 1
Feb 24, 2015
By Carl Livitt
Tastic RFID Thief: Silent, But Deadly
Sep 24, 2014
By Francis Brown
SearchDiggity: Avoid Bot Detection Issues by Leveraging Google, Bing, and Shodan APIs
Aug 29, 2014
By Francis Brown
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.