Top 5 Java frameworks in 2022

Top 5 Java frameworks in 2022

Top 5 Java frameworks in 2022 Decades after its initial release, Java is still one of the most popular high-level, object-oriented programming languages out there. The language is designed to have as few dependencies as possible while simultaneously enabling...
Best practices to prevent IDOR vulnerabilities

Best practices to prevent IDOR vulnerabilities

Best practices to prevent IDOR vulnerabilities What is Insecure Direct Object Reference? Insecure Direct Object Reference (IDOR) is a vulnerability that can lead to a cyber attack. Without the user’s permission, URL parameters or form field data are changed to provide...
Vulnerabilities in authentication and authorization

Vulnerabilities in authentication and authorization

Vulnerabilities in authentication and authorization Authentication vs authorization Most people don’t fully understand the difference between authentication and authorization and regularly use them interchangeably, despite having fundamentally different functions....
Interview with Tamás Lengyel, Intel

Interview with Tamás Lengyel, Intel

Interview with Tamás Lengyel Tell us a bit about yourself Hey everyone! I work at Intel as a Senior Security Researcher in the Software and Advanced Technologies Group. My team has a very wide scope in terms of software security at Intel: we have a company-wide...