Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java

Reading Time: 9 minutes Deserialization vulnerabilities in Java Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding...
Interview with Gábor Molnár, Google

Interview with Gábor Molnár, Google

Reading Time: 6 minutes Interview with Gábor Molnár, Google Tell us a bit about yourself Hi, I’m Gábor Molnár, Senior Information Security Engineer at Google, and a web-security and foosball enthusiast! The ISE team at Google is responsible for product security...
Cybernews: Interview with Márk Félegyházi, Avatao

Cybernews: Interview with Márk Félegyházi, Avatao

Reading Time: 8 minutes Cybernews: Interview with Márk Félegyházi, Avatao With ever-evolving cyberattacks, it’s getting more difficult to secure a whole organization. And when working from home became the new normal, the use of unsecured devices and networks created...
Source code under attack: the Samsung breach

Source code under attack: the Samsung breach

Reading Time: 10 minutes Source code under attack: the Samsung breach On Monday March 7th, Samsung announced that a group of hackers had accessed the company’s data, including the source code of several products including Galaxy smartphones and tablets. In their...
Zero trust security

Zero trust security

Reading Time: 9 minutes Never trust, always verify – Zero Trust security “In three years… Zero Trust will be cited as one of the big-time frameworks in cyber security.”- Chase Cunningham, Principal Analyst at Forrester. As a technology professional, you...
4 API testing methods

4 API testing methods

Reading Time: 7 minutes 4 testing techniques and tools for API security Understanding the importance of API security is just the first step in an extensive process of securing your APIs from different kinds of attacks. API usage is extremely common throughout many...