Published onJuly 1, 2022Leveraging Cloud for Data Protection ComplianceCloudData-PrivacyInsights on using Cloud for Data Protection Compliance
Published onMay 25, 2022Securing Android Application User SessionsIAMSecrets-ManagementA guide to building secure user sessions on Android applications
Published onMay 17, 2022Spring Boot Authentication and AuthorizationIAMA guide to building secure user authentication and authorization in Java Spring Boot
Published onMay 14, 2022Authentication Bypass Through PHP Type JugglingIAMBug-BountyDemonstrating authentication bypass by exploiting PHP Type Juggling
Published onJune 7, 2021Exploiting Time-Based Blind SQL Injection With SQLMapInjectionBug-BountyDemonstrating time-based blind SQL injection exploitation with SQLMap