teal lock on blue background with network
Business logic: The silent future of cyberattacks
Application Security
Future hacks won’t trigger alarms or leave traces. No security measures will be violated. The systems are functioning normally –...
Will AI replace human pen testers?
Application Security
It’s become pretty standard to expect the help of AI with automating tasks, with penetration testing being no exception. As...
bug bounty program graphic in light blue with bug, money and laptop icon
Bug bounty programs: Can you rely on them 100%?
Application Security
It’s tempting to view bug bounty programs as a cheat code – an enticing shortcut to uncover vulnerabilities by tapping...
Outpost24 logo
CVE-2024-58248: Race condition vulnerability leaves nopCommerce at risk of...
Application Security
I recently discovered an interesting race condition vulnerability in the eCommerce software nopCommerce, during a manual pen test as part...
Graphic for blog on OAuth vulnerabilities
Tokens & traps: Seven common OAuth vulnerabilities (plus mitigations)
Application Security
In the world of modern web applications, the OAuth flow is our trusty gatekeeper, enabling seamless logins and secure data...