In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.
Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.
Ever have meterpreter shells consistently fail? Anti-virus products may be causing your penetration tests to fall flat. By using unique encoded meterpreter shells you can avoid AV and elevate your penetration tests.
This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy.
Unlike ACLs and bucket policies, IAM policies are targeted at IAM users/groups instead of S3 buckets and objects.
Amazon Web Services (AWS) provides some of the most powerful and robust infrastructure for modern web applications.
jQuery is a JavaScript UI framework which provides an abstraction layer to many DOM manipulation functions.
Regardless if you work in Security, Compliance, IT, or management, it is a near 100% chance that you have encountered wireless networks in the enterprise before.