We use cookies to enhance your experience of our website, save your preferences and provide us with information on how you use our website. For more information please read our Privacy Policy. By using our website without changing your browser settings you consent to our use of cookies.
Blog Posts
Rate Limiting 101: Protecting Your Network from Cyber Attacks
Nov. 14, 2023 Rate Limiting 101: Protecting Your Network from Cyber Attacks
Defend Against Dependency Confusion Attacks
Oct. 1, 2023 Defend Against Dependency Confusion Attacks
Securing the cloud: lessons to draw from major breaches
Sept. 18, 2023 Securing the cloud: lessons to draw from major breaches
Exploiting Type Confusion
July 12, 2023 Exploiting Type Confusion
Cross-Site Request Forgery (CSRF) 101: Attacks, Bypasses and Mitigations
June 22, 2023 Cross-Site Request Forgery (CSRF) 101: Attacks, Bypasses and Mitigations
Understanding Cross-Site WebSocket Hijacking
May 16, 2023 Understanding Cross-Site WebSocket Hijacking
Scaling Attacks on AI Images
April 18, 2023 Scaling Attacks on AI Images
Cyphal Protocol Real Time Intravehicular Distributed Communication Protocol
April 6, 2023 Cyphal Protocol Real Time Intravehicular Distributed Communication Protocol
AWS Identity and Access Management (IAM) Best Practices
April 1, 2023 AWS Identity and Access Management (IAM) Best Practices
Leveraging JSONP to bypass cross-domain restrictions
Feb. 19, 2023 Leveraging JSONP to bypass cross-domain restrictions
How to Bypass SameSite Cookie Check on Android Browser
Feb. 16, 2023 How to Bypass SameSite Cookie Check on Android Browser
Yellowfin BI’s Security Issues Highlight Risk of Hardcoded Keys
Feb. 2, 2023 Yellowfin BI’s Security Issues Highlight Risk of Hardcoded Keys
CircleCI Data Breach Highlights Need for a Proactive Approach to Security
Jan. 20, 2023 CircleCI Data Breach Highlights Need for a Proactive Approach to Security
Bricklink’s XML external entity (XXE) injection
Dec. 12, 2022 Bricklink’s XML external entity (XXE) injection
Tools and Resources for Performing Cloud Penetration Testing
Oct. 10, 2022 Tools and Resources for Performing Cloud Penetration Testing
Best Practices for Securing Application Programming Interfaces (APIs)
Aug. 18, 2022 Best Practices for Securing Application Programming Interfaces (APIs)
Risky Business: How to Map and Minimize Third-Party Cyber-Security Risks
Aug. 17, 2022 Risky Business: How to Map and Minimize Third-Party Cyber-Security Risks
Best Practices for Blockchain Implementation
Dec. 1, 2021 Best Practices for Blockchain Implementation
​Securing emerging technologies: strategies for more effective IoT and cloud threat
July 6, 2021 ​Securing emerging technologies: strategies for more effective IoT and cloud threat
Cloud security: what every tech leader needs to know
July 5, 2021 Cloud security: what every tech leader needs to know
Deconstructing Apple card: A hacker’s perspective
July 4, 2021 Deconstructing Apple card: A hacker’s perspective
Apple iOS ‘Zero-Click Exploit’ Discovery Walk through: Takeaways for Security Professionals
Dec. 20, 2020 Apple iOS ‘Zero-Click Exploit’ Discovery Walk through: Takeaways for Security Professionals
Cloud Computing Security Challenges and Considerations
Feb. 20, 2020 Cloud Computing Security Challenges and Considerations
Insider Threat Prevention: Would Your Company’s Data Loss Prevention Capabilities Identify What This Cat is Hiding?
Jan. 8, 2020 Insider Threat Prevention: Would Your Company’s Data Loss Prevention Capabilities Identify What This Cat is Hiding?
Critical Medtronic Heart Device Flaws Show Need for Internet of Things (IoT) Security
April 19, 2019 Critical Medtronic Heart Device Flaws Show Need for Internet of Things (IoT) Security
Learning From Data Breaches: Integrating Security in DevOps
Aug. 17, 2018 Learning From Data Breaches: Integrating Security in DevOps
Transitioning from DevOps to Rugged DevOps: Avoiding the pitfalls
Aug. 9, 2018 Transitioning from DevOps to Rugged DevOps: Avoiding the pitfalls