Security Research blog that you ❤️

Exploit Development, Reverse Engineering, and AI

Insecure Design is a new category in the OWASP Top 10 2021. It focuses on risks related to design and architectural flaw...

#architecture #threat-modeling #design
Read more

Protecting sensitive data is paramount. A common failure is using weak cryptographic algorithms or storing passwords in ...

#crypto #hashing #security
Read more

Broken Access Control moved to the number one spot in the OWASP Top 10 2021. One common manifestation is Insecure Direct...

#idor #nodejs #owasp
Read more

SQL Injection (SQLi) remains one of the most critical web vulnerabilities. It occurs when untrusted user input is direct...

#web-security #sql #owasp
Read more

The "forkbomb" is a classic denial-of-service attack against a Linux system. It works by recursively spawning new proces...

#malware #assembly #reverse-engineering #linux
Read more

In the rapidly evolving landscape of cybersecurity, reacting to threats is no longer enough. Threat Modeling is a proact...

#security #threat-modeling #CISO
Read more