http2 downgrading request smuggling
Request smuggling and HTTP/2 downgrading: exploit walkthrough
Application Security
Detailed overview and real-world exploit of request smuggling vulnerability from HTTP/2 downgrading.
unveiling-lummaC2
Analyzing LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for...
Research & Threat Intel
Lumma stealer’s new Anti-Sandbox technique that forces the malware to wait until “human” behavior is detected.
traditional pen testing
Can traditional pen testing keep up with modern AppSec?...
Application Security
A pen tester’s perspective on the most common issues with vulnerability scanning and traditional pen testing of modern web apps.
press release
Outpost24 adds Threat Explorer to threat intelligence platform for...
Press Release
Leading cyber risk management and threat intelligence provider Outpost24 today announced the release of Threat Explorer, an advanced vulnerability intelligence...
broken-access
Broken access control vulnerabilities and why scanners can’t detect...
Application Security
Examples of broken access control vulnerabilities and why they remain present even after vulnerability scans and assessments.