BoMs Away – Why Everyone Should Have a BoM
In this talk, Steve describes the various use cases of a software bill-of-materials (BOM), including facilitating accurate vulnerability and other...
Read more →In this talk, Steve describes the various use cases of a software bill-of-materials (BOM), including facilitating accurate vulnerability and other...
Read more →What I Learned Watching All 44 AppSec Cali 2019 Talks OWASP AppSec California is one of my favorite security conferences:...
Read more →I hope you’ve been doing well! New Platform, Who Dis? 👋 Hello and welcome to the first edition of tl;dr...
Read more →I hope you’ve been doing well! 💪 Bro-ing Out This week I’m visiting by brother, who has kindly offered to...
Read more →I hope you’ve been doing well! The “Full Utah” Experience Last weekend I got to hang out with my friend...
Read more →In this talk, Louis covers 3 web cache related attacks: cache deception, edge side includes, and cache poisoning. Note: this...
Read more →Back in March 2023, I noticed an interesting security advisory that was published by Wordfence about a critical “Authentication Bypass...
Read more →Emma Stocks | 03 July 2023 at 14:54 UTC Want to create customized scans without the hassle of learning advanced...
Read more →Summary URL query parameters are not adequately sanitised before they are placed into an HTTP Location header. An attacker can...
Read more →One of the targets we looked at late last year was Citrix Gateway. Citrix Gateway is another of these “all-in-one”...
Read more →Ollie Whitehouse | 29 June 2023 at 12:46 UTC Scripted scan checks in Burp Suite Professional are now a thing...
Read more →Customizable integrations for today’s security team Resolving vulnerabilities quickly depends on several factors, not least how effectively security and product...
Read more →