![](https://cdn.invicti.com/app/uploads/2022/06/28121323/Sound-Hijacking-300x158.jpg)
Articles by Ziyahan Albeniz
![](https://cdn.invicti.com/app/uploads/2022/06/28121323/Sound-Hijacking-300x158.jpg)
![](https://cdn.invicti.com/app/uploads/2022/06/28121320/brave-browser-sacrifices-security-300x158.png)
Brave Browser Sacrifices Security
![](https://cdn.invicti.com/app/uploads/2022/06/28121324/Phishing-by-Open-Graph-Protocol-300x158.png)
Phishing by Open Graph Protocol
![](https://cdn.invicti.com/app/uploads/2022/06/28121327/Remote-Control-Computer-Hardware-300x158.png)
Remote Hardware Takeover via Vulnerable Admin Software
![](https://cdn.invicti.com/app/uploads/2022/06/28121329/cross-site-cookie-manipulation-300x158.png)
Cross Site Cookie Manipulation
![](https://cdn.invicti.com/app/uploads/2022/06/28121330/CVSS-characterizing-and-scoring-vulnerabilities-300x158.png)
CVSS: Characterizing and Scoring Vulnerabilities
![](https://cdn.invicti.com/app/uploads/2022/06/28121339/Two-interesting-session-related-vulnerabilities-300x158.png)
Using Session Puzzling to Bypass Two-Factor Authentication
![](https://cdn.invicti.com/app/uploads/2022/06/28121338/Clickjacking-Attack-on-Facebook-300x158.png)
Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation
![](https://cdn.invicti.com/app/uploads/2022/06/28121342/Importance-content-type-header-http-requests-300x158.png)
The Importance of the Content-Type Header in HTTP Requests
![](https://cdn.invicti.com/app/uploads/2022/06/28121350/Tabnabbing-protection-bypass-300x158.png)
Tabnabbing Protection Bypass
![](https://cdn.invicti.com/app/uploads/2022/06/28121352/Fragmented-sql-injection-attacks-300x158.png)
Fragmented SQL Injection Attacks – The Solution
![](https://cdn.invicti.com/app/uploads/2022/06/28121355/Exposing-public-ips-tor-services-through-ssl-certificates-300x158.png)