Surviving the Week 5/25/2012
Not that it has been a quiet week in the web application seucrity arena, it was simply a busy week. Microsoft’s SDL Expands Beyond Redmond […]
Not that it has been a quiet week in the web application seucrity arena, it was simply a busy week. Microsoft’s SDL Expands Beyond Redmond […]
Hmmm Lets see if I even remember how to enter this stuff anymore… Yeap you guessed it, we finally recorded another episode – WOOT! Show […]
Podcast: Play in new window | Download (Duration: 51:43 — 72.7MB)
Subscribe: Apple Podcasts | RSS
WAF Wars WAF is more commonly used as an IDS rather than IPS, This is mainly due to the amount of alerts they generate when […]
Common User Passwords Profiler Interesting python script which when used in conjunction with information from social media i.e. Facebook, Twitter and Linkedin it can create […]
Insight to online black markets and how they work A short article that provides a brief look at how bitcoins and Tor make anonymous black […]
We released a new white paper today, Top 10 Business Logic Attack Vectors. Why did we write this paper? Business logic vulnerabilities are not new, […]
Copyright © 2024 | WordPress Theme by MH Themes