Tag
security
DOM XSS Fuzzing strategies - Part 1
XSS are still by far the most common type of vulnerabilities, this article presents strategies to automate the search for XSSes.
Sat 22 December 2018
Hardcoded AWS keys in Mobile Applications
This article is about how to manage AWS access keys when using AWS services in your mobile application.
Thu 20 December 2018