We use cookies to enhance your experience of our website, save your preferences and provide us with information on how you use our website. For more information please read our Privacy Policy. By using our website without changing your browser settings you consent to our use of cookies.
Posts
Deconstructing Apple card: A hacker’s perspective
July 4, 2021 Deconstructing Apple card: A hacker’s perspective
Best Practices for Securing Application Programming Interfaces (APIs)
Aug. 18, 2022 Best Practices for Securing Application Programming Interfaces (APIs)
CircleCI Data Breach Highlights Need for a Proactive Approach to Security
Jan. 20, 2023 CircleCI Data Breach Highlights Need for a Proactive Approach to Security
Yellowfin BI’s Security Issues Highlight Risk of Hardcoded Keys
Feb. 2, 2023 Yellowfin BI’s Security Issues Highlight Risk of Hardcoded Keys
Leveraging JSONP to bypass cross-domain restrictions
Feb. 19, 2023 Leveraging JSONP to bypass cross-domain restrictions
Case Study
End-to-end product security testing helps tech company drive innovation.
End-to-end product security testing helps tech company drive innovation.