Priority Post

SAP HANA Pentesting. Part 1: Vulnerabilities history

Three years have passed since the day when we published the details of the first vulnerability in SAP HANA. Nowadays…

3 years ago

Exploit kits: Winter 2018 review

In this Winter 2018 review, we check the pulse of exploit kits and their latest developments. Categories: Exploits Threat analysis…

3 years ago

How Universities Should Respond to Iranian Hacking Charges

Last week, news broke that an Iranian hacker network, Mabna Institute, had been systematically stealing data from universities across the…

3 years ago

Why You Should Never Pass Untrusted Data to Unserialize When Writing PHP Code

In PHP, as in every other programming language you use for web development, developers should avoid writing code that passes…

3 years ago

Omitting the “o” in .com Could Be Costly

Take care when typing a domain name into a browser address bar, because it's far too easy to fat-finger a…

3 years ago

R⁶ — Capturing [YouTube] Captions

(R⁶ == brief, low-expository posts) @yoniceedee suggested I look at the Cambridge Analytics “whistleblower” testimony proceedings: @hrbrmstr giving the term…

3 years ago

Leveraging tokenization services from the major card brands

As the volume of both card-based payments and digital payments continue to grow significantly year-on-year, the importance of securing sensitive...…

3 years ago

MY TAKE: Why Google’s move to label non-HTTPS sites ‘not secure’ is a good thing

San Francisco-based Cloudflare has traversed an interesting path to becoming a leading cybersecurity vendor. Back in 2004, Matthew Prince and…

3 years ago

SamSam Ransomware: How to Identify and Mitigate the Risk

As many news outlets have reported, Atlanta is recovering from an attack on its city computers that occurred on the…

3 years ago

Burp Suite continuing the Saga

Welcome to the fourth blog introducing and exploring the features of Burp Suite. Please visit Secure Ideas’ previous blogs on…

3 years ago