The OWASP API Security Top 10 – Demystified This is a practical workshop on OWASP API Security Top 10.

Wesley Thijs will bring you a presentation of these 10 threats, demonstrated in a practical, hack-a-long manner which will allow participants to get hands-on with these categories to help you master t ...

Continue Reading
I’m not a fan of the new “add to cart” button.

The old one was simple, elegant and worked well. The new one is ugly, complicated and doesn’t work as well. I don’t know what they were thinking when they designed it but I hope that this isn’t the ...

Continue Reading
I’m selling my notes on bug bounties, web application security and ethical hacking.

If you're interested in learning more about this topic, check out the blog post below for more information https://t.co/u3C2kwMUPR ...

Continue Reading
VMware CTO Raghu Raghuram is leaving the company

VMware CTO Raghu Raghuram is leaving the company https://t.co/YN3Z203SKw ...

Continue Reading
I’m not sure how to feel about this book.

It was very well written, but I didn’t really like the characters or the story https://t.co/ml8m4ZG0H0 ...

Continue Reading
The FBI held back Ransomware-as-a-Service (RaaS) code from the public, but it was leaked.

The code is now available on Github. The FBI has been holding onto a piece of ransomware that they've been using to track down criminals who use this type of malware in their attacks. However, the age ...

Continue Reading
If you’re a new player, don’t worry about it.

If you're an old player who's been away for a while and want to get back into the game, then this is your chance https://t.co/ar6MAANsGL ...

Continue Reading
HTTP Basic Authentication is not secure and should be avoided.

OAuth 2.0 The second authentication mechanism presented in the book is OAuth 2.0, which is an authorization framework that enables a third-party application to obtain limited access to an HTTP servic ...

Continue Reading

Back to Main

Subscribe for the latest news: