


Path traversal in Java web applications – announcing the Invicti technical paper

So you think cross-site scripting isn’t a big deal?

Invicti’s Spring 2022 AppSec Indicator highlights unrelenting direct-impact flaws

Input Validation Errors: Vulnerability, Examples, Fixes, Missing Input, and more

The cutting-edge conundrum: Why federal agencies can’t compromise on security

Common authentication and authorization vulnerabilities (and how to avoid them)

What the OWASP Top 10 categories mean for OWASP compliance

Understanding session fixation attacks

JSON Web Token attacks and vulnerabilities

Introduction to web cache poisoning
