Forem

# appsec

Application security topics beyond the web, including mobile and desktop applications.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security is a risk function

Security is a risk function

Comments
1 min read
Login Page for Modern Applications
Cover image for Login Page for Modern Applications

Login Page for Modern Applications

1
Comments
6 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Leveraging Large Language Models for Cross-Component Vulnerability Detection
Cover image for Leveraging Large Language Models for Cross-Component Vulnerability Detection

Leveraging Large Language Models for Cross-Component Vulnerability Detection

Comments
3 min read
How to pass the OWASP MASVS verification by design
Cover image for How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

4
Comments
6 min read
OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!
Cover image for OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!

OWASP® Cornucopia Website App 2.1 & Mobile App 1.1!

7
Comments
5 min read
SQL Injection: the vulnerability that refuses to die

SQL Injection: the vulnerability that refuses to die

Comments
4 min read
How to do threat modeling for agile mobile app development?
Cover image for How to do threat modeling for agile mobile app development?

How to do threat modeling for agile mobile app development?

4
Comments
8 min read
Access Control Security: Learning from Major Data Breaches
Cover image for Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
My VAPT Learning Journey
Cover image for My VAPT Learning Journey

My VAPT Learning Journey

Comments
3 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
Why Security Misconfigurations Matter and 5 Ways to Prevent Them
Cover image for Why Security Misconfigurations Matter and 5 Ways to Prevent Them

Why Security Misconfigurations Matter and 5 Ways to Prevent Them

Comments
1 min read
API Security: Threats, Tools, and Best Practices
Cover image for API Security: Threats, Tools, and Best Practices

API Security: Threats, Tools, and Best Practices

5
Comments
1 min read
Introducing Omni4J: Secure your Java code
Cover image for Introducing Omni4J: Secure your Java code

Introducing Omni4J: Secure your Java code

Comments
2 min read
DEF CON 32: What We Learned About Secrets Security at AppSec Village
Cover image for DEF CON 32: What We Learned About Secrets Security at AppSec Village

DEF CON 32: What We Learned About Secrets Security at AppSec Village

8
Comments 1
9 min read
Prevention: It's Time to Save Those Millions
Cover image for Prevention: It's Time to Save Those Millions

Prevention: It's Time to Save Those Millions

1
Comments
2 min read
Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Lessons Learned #1: One line of code can make your application vulnerable (Pre-Auth RCE in Metabase CVE-2023–38646)

Comments
4 min read
Compreendendo o SAMM
Cover image for Compreendendo o SAMM

Compreendendo o SAMM

1
Comments
6 min read
Web Security and Bug Bounty Hunting: Knowledge, Tools, and Certifications

Web Security and Bug Bounty Hunting: Knowledge, Tools, and Certifications

3
Comments
3 min read
Understanding the Distinction Between Information Security and Cybersecurity

Understanding the Distinction Between Information Security and Cybersecurity

Comments
2 min read
Secure SDLC (Part 1): issues, approach, tech metrics, team’s KPI

Secure SDLC (Part 1): issues, approach, tech metrics, team’s KPI

1
Comments
6 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
loading...