Security Audits: Objectives, Types and Methodologies With cyberattacks on the rise, carrying out an IT security audit has never been a higher priority for businesses. Web applications, mobile apps, APIs,... 06.08 Applications
What is Prototype Pollution? Exploitations and Security Tips Prototype pollution vulnerabilities are specific to JavaScript. They can be exploited on both the server and client sides. These vulnerabilities allow... 06.08 Applications
Account Takeover Techniques and Security Best Practices Account takeover is a common practice that threatens the security of users and their data. The impact on victims depends on the type of account target... 22.07 Applications
SAML: How it Works, Vulnerabilities and Common Attacks Secure identity and access management has become a key challenge for organisations. Among the solutions available, Security Assertion Markup Language ... 19.07 Applications
Exploring LLM Vulnerabilities and Security Best Practices You’ve probably heard about the arrival of LLMs in a big way, at least with ChatGPT. LLM (Large Language Model) refers to language processing mo... 13.05 Applications
GraphQL API Vulnerabilities, Common Attacks and Security Tips Developed in 2012 and made open source in 2015 by Facebook, GraphQL (Graph Query Language) has been under the umbrella of the GraphQL Foundation since... 13.05 Applications
Identification and Authentication Failures: OWASP Top 10 #7 Authentication and, by extension, user identification are central to web applications. These two mechanisms are used to manage rights and access (for ... 15.04 Applications
Modifying Java Serialized Objects as Easily as JSON Often, when we hear about Java serialization, we find resources or challenges that only talk about generating and executing ysoserial payloads. In som... 11.04 Applications
What is a DoS Attack? Types, Exploitations and Security Tips In the space of 5 years, the number of Denial of Service (DoS) attacks has almost doubled. The result is the paralysis of tens of millions of web plat... 11.04 Applications
Black Box Penetration Testing: Objective, Methodology and Use Cases During a penetration test, we generally consider 3 test conditions: black, grey or white box. These test conditions correspond to the levels of inform... 11.03 Applications