Security Research blog that you ❤️
Exploit Development, Reverse Engineering, and AI
November 15, 2023
Insecure Design is a new category in the OWASP Top 10 2021. It focuses on risks related to design and architectural flaw...
November 14, 2023
Protecting sensitive data is paramount. A common failure is using weak cryptographic algorithms or storing passwords in ...
November 12, 2023
Broken Access Control moved to the number one spot in the OWASP Top 10 2021. One common manifestation is Insecure Direct...
November 10, 2023
SQL Injection (SQLi) remains one of the most critical web vulnerabilities. It occurs when untrusted user input is direct...
November 5, 2023
The "forkbomb" is a classic denial-of-service attack against a Linux system. It works by recursively spawning new proces...
October 27, 2023
In the rapidly evolving landscape of cybersecurity, reacting to threats is no longer enough. Threat Modeling is a proact...