Community BlogVulnerability Management Breaking Down the OWASP Top 10: Insecure DesignDecember 17th, 2024 Learn about the different types of insecure design vulnerabilities and how to identify them. Read More
Community BlogVulnerability Management Breaking Down the OWASP Top 10: InjectionNovember 21st, 2024 Gain insights into injection vulnerabilities, the different classifications, and potential security bypass techniques. Read More
Community BlogVulnerability Management OWASP Top 10: The Risk of Cryptographic FailuresOctober 21st, 2024 Cryptographic failures: what are they and why are they considered so concerning by the OWASP Top 10? Read More
Community BlogVulnerability Management Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans RosenOctober 17th, 2024 The file upload vulnerability type is as broad in scope as the number of different file types. These... Read More
Community Blog How To Find Broken Access Control Vulnerabilities in the WildSeptember 30th, 2024 Learn the ins and outs of broken access control vulnerabilities and how to find them in your security research. Read More
Community Blog A Guide To Subdomain Takeovers 2.0September 25th, 2024 Learn the ins and outs of understanding subdomain configurations with current resources and tools from an expert security researcher. Read More
Community Blog 100 Hacking Tools and ResourcesAugust 20th, 2024 Whether you’ve just started hacking or are a real pro, we’ve created the ultimate list of 100 hacking tools for your toolkit! Read More
Community BlogVulnerability Management How a GraphQL Bug Resulted in Authentication BypassJuly 29th, 2024 Experienced security researchers explain how a GraphQL bug resulted in authentication bypass — and how to avoid it. Read More