In this blog post, we demonstrate how graphical user interfaces could be vulnerable to spoofing attacks by using certain Unicode characters.
Selecting a penetration testing company can be a pain. Here are five important tips to ensure you penetration testing vendor will set you up for success.
This is a tale of how we found a wormable XSS on Twitter, and how we managed to fully bypass its CSP policy.
Amazon Web Services (AWS) provides some of the most powerful and robust infrastructure for modern web applications.
jQuery is a JavaScript UI framework which provides an abstraction layer to many DOM manipulation functions.
Many vulnerability scanners will raise false positives regarding outdated installations of OpenSSH on Ubuntu
We see a lot of confusion regarding the X-XSS-Protection header and thought it might be worthwhile to go over exactly what this header is and what it isn’t.