


What is the root cause of SQL injection?

How to prevent SQL injection

Injection Attacks in App Sec: Types, tools, examples

Insecure deserialization in web applications

An abundance of caution: Why the curl buffer overflow is not the next Log4Shell

Rapid Reset HTTP/2 vulnerability: When streaming leads to flooding

SQL injection vulnerability in MOVEit Transfer leads to data breaches worldwide

Exploiting insecure exception logging

IDOR, you DOR, everybody DOR: The dangers of direct object references

7 steps to avoid uncoordinated vulnerability disclosure
