Resources

Web Security

Web Security

Second wave of Shai-Hulud npm worm compromises the global software supply chain

Web Security

The End of CoinHive and the Rise of Cryptojacking

Web Security

Introducing the Security of Cookies Whitepaper

Web Security

Sound Hijacking – Abusing Missing XFO

Web Security

Brave Browser Sacrifices Security

Web Security

Phishing by Open Graph Protocol

Web Security

Remote Hardware Takeover via Vulnerable Admin Software

Web Security

Cross Site Cookie Manipulation

Web Security

CVSS: Characterizing and Scoring Vulnerabilities