Category: Mix
API abuse and web application bot attacks are often confused. This is understandable, as both involve automated interactions and are…
Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were…
If you weren’t lucky enough to catch us at a roadshow event, you’ll be delighted to know you can catch…
As cyber attackers refine their skills, their methods evolve to exploit vulnerabilities in innovative and increasingly difficult-to-detect ways. The modern…
Many Facets, One Goal A common trope in cybersecurity is “don’t roll your own auth.” There’s a reason for this: implementing…
One hundred million is an enormous number. Today we celebrate with all our hackers the phenomenal milestone of a hundred…
The merciless killing by police of George Floyd laid bare, once again, the institutionalized racism that plagues the USA. It…
This year, we launched new initiatives designed to bring people together in fun and innovative ways, including playing online games,…
.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…
We start the new year of 2020 with great prospects. First of all, 2019 turned out to be a massive…
Q: Please introduce yourself. Tell us what you do at REI and why cybersecurity is important to REI. A: I’m…
APIs are the backbone of interconnected applications, enabling organizations to innovate, integrate, and scale rapidly. However, as enterprises continue to…