Resources

Web Security

Web Security

Second wave of Shai-Hulud npm worm compromises the global software supply chain

Web Security

Acquiring Data with CSS Selectors and Javascript on Time Based Attacks

Web Security

Why Framework Choice Matters in Web Application Security

Web Security

Using Session Puzzling to Bypass Two-Factor Authentication

Web Security

DNSFS: Is it possible to use DNS as a file system?

Web Security

Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

Web Security

Discovering and hacking IoT devices using web-based attacks

Web Security

The Importance of the Content-Type Header in HTTP Requests

Web Security

Sven Morgenroth Talks About PHP Object Injection Vulnerabilities on Paul's Security Weekly Podcast