Articles by

Mohamed Benchikh

Image of Mohamed Benchikh

The article delves into dependency confusion vulnerabilities and introduces a novel detection and exploitation technique then provides actionable steps to mitigate the risks associated with this vulnerability.

Security

One Scheme to Rule Them All: OAuth Account Takeover

This article delves into the exploitation of OAuth account takeover using app impersonation throu...

Tue 17 October 2023