Forem

TECNO Security profile picture

TECNO Security

TECNO Security Response Center is a platform for cooperation and exchanges between TECNO and security industry experts, researchers, and organizations.

Pronouns

TECNO SRC

Security Vulnerability in Hidden Parameters: IDOR Attack on Mighty App Payment Page
Cover image for Security Vulnerability in Hidden Parameters: IDOR Attack on Mighty App Payment Page

Security Vulnerability in Hidden Parameters: IDOR Attack on Mighty App Payment Page

Comments
1 min read

Want to connect with TECNO Security?

Create an account to connect with TECNO Security. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
[Vulnerability Campaign] Protect TECNO devices
Cover image for [Vulnerability Campaign] Protect TECNO devices

[Vulnerability Campaign] Protect TECNO devices

Comments
1 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks
Cover image for (Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks
Cover image for (Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
(Ⅱ) Android Identity Authentication
Cover image for (Ⅱ) Android Identity Authentication

(Ⅱ) Android Identity Authentication

Comments
2 min read
(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"
Cover image for (Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

Comments
1 min read
CVE Exclusive Activity
Cover image for CVE Exclusive Activity

CVE Exclusive Activity

Comments
1 min read
[Best of February - M3Di] From Forest to Code: Transformational Security Researcher Growth Notes
Cover image for [Best of February - M3Di] From Forest to Code: Transformational Security Researcher Growth Notes

[Best of February - M3Di] From Forest to Code: Transformational Security Researcher Growth Notes

Comments
1 min read
Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers
Cover image for Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Comments
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv
Cover image for 【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Beginner’s Guide: Basic Methods for Finding Android Application Vulnerabilities
Cover image for Beginner’s Guide: Basic Methods for Finding Android Application Vulnerabilities

Beginner’s Guide: Basic Methods for Finding Android Application Vulnerabilities

Comments
1 min read
"Hacker of the Month" - Find Excellence
Cover image for "Hacker of the Month" - Find Excellence

"Hacker of the Month" - Find Excellence

Comments
1 min read
Automated Penetration Testing: A Guide to Domain Collection
Cover image for Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities
Cover image for 【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities

【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities

Comments
1 min read
Guidelines about the Refer-a-Friend Program
Cover image for Guidelines about the Refer-a-Friend Program

Guidelines about the Refer-a-Friend Program

Comments
1 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies
Cover image for SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
TECNO SRC Security Vulnerability Submission Function Survey
Cover image for TECNO SRC Security Vulnerability Submission Function Survey

TECNO SRC Security Vulnerability Submission Function Survey

Comments
1 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets
Cover image for Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
Web vulnerability bounty rules update
Cover image for Web vulnerability bounty rules update

Web vulnerability bounty rules update

2
Comments
1 min read
【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate
Cover image for 【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate

【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate

Comments
1 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies
Cover image for Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
[2024 Thanksgiving] Security Technology Research Writing Activity
Cover image for [2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Guide to Writing Security Technology Blog Articles
Cover image for Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

2
Comments
1 min read
Hacking your first OAuth on the Web application
Cover image for Hacking your first OAuth on the Web application

Hacking your first OAuth on the Web application

Comments
1 min read
TECNO Security Year-End Reward Sprint Preview: Grand Prizes Await You!
Cover image for TECNO Security Year-End Reward Sprint Preview: Grand Prizes Await You!

TECNO Security Year-End Reward Sprint Preview: Grand Prizes Await You!

Comments
1 min read
E-commerce website vulnerability bounty practice sharing(Ⅱ)

E-commerce website vulnerability bounty practice sharing(Ⅱ)

Comments
1 min read
E-commerce website vulnerability bounty practice sharing(I)
Cover image for E-commerce website vulnerability bounty practice sharing(I)

E-commerce website vulnerability bounty practice sharing(I)

Comments
2 min read
Story of Time Machines: Where Archived URLs and Juicy Information Handshake Each Other
Cover image for Story of Time Machines: Where Archived URLs and Juicy Information Handshake Each Other

Story of Time Machines: Where Archived URLs and Juicy Information Handshake Each Other

Comments
1 min read
TECNO Security Response Center 3rd Anniversary | Safeguarding Product Security, Grateful for Our Encounter
Cover image for TECNO Security Response Center 3rd Anniversary | Safeguarding Product Security, Grateful for Our Encounter

TECNO Security Response Center 3rd Anniversary | Safeguarding Product Security, Grateful for Our Encounter

Comments
1 min read
Insecure Direct Object Reference (IDOR)
Cover image for Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
Share Your Favorite TECNO Security Function to win rewards!
Cover image for Share Your Favorite TECNO Security Function to win rewards!

Share Your Favorite TECNO Security Function to win rewards!

Comments
1 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting
Cover image for Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
[Specially Customized] TECNO Security 3rd Anniversary Bug Hunting Competition!
Cover image for [Specially Customized] TECNO Security 3rd Anniversary Bug Hunting Competition!

[Specially Customized] TECNO Security 3rd Anniversary Bug Hunting Competition!

Comments
1 min read
Response Manipulation FTW: Understanding and Exploiting Response Manipulation
Cover image for Response Manipulation FTW: Understanding and Exploiting Response Manipulation

Response Manipulation FTW: Understanding and Exploiting Response Manipulation

Comments
1 min read
3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test
Cover image for 3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

Comments
1 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis
Cover image for OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack
Cover image for An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
30-day Time Limit: Swagshop Credit-Giving Activity
Cover image for 30-day Time Limit: Swagshop Credit-Giving Activity

30-day Time Limit: Swagshop Credit-Giving Activity

Comments
1 min read
Complete Guide To Redeeming TECNO SRC Credits
Cover image for Complete Guide To Redeeming TECNO SRC Credits

Complete Guide To Redeeming TECNO SRC Credits

Comments
1 min read
Security Meetup
Cover image for Security Meetup

Security Meetup

Comments
1 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown
Cover image for SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Quarterly Rewards for security researchers!
Cover image for Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
【Ethical Hacker】Nice to meet you~
Cover image for 【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Security Hazards in the Use of startActivityForResult and setResult
Cover image for Security Hazards in the Use of startActivityForResult and setResult

Security Hazards in the Use of startActivityForResult and setResult

Comments
1 min read
TECNO Web Security Challenge Campaign starts now
Cover image for TECNO Web Security Challenge Campaign starts now

TECNO Web Security Challenge Campaign starts now

2
Comments
1 min read
Comprehensive research of Android Permission Mechanisms
Cover image for Comprehensive research of Android Permission Mechanisms

Comprehensive research of Android Permission Mechanisms

Comments
1 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme
Cover image for RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!
Cover image for TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
loading...