Forem

# appsec

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Threat modeling your AI models using AI?

Threat modeling your AI models using AI?

Comments
2 min read
9 Free Web App Vulnerability Scanners You Should Know in 2025

9 Free Web App Vulnerability Scanners You Should Know in 2025

1
Comments
4 min read
🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

Comments
2 min read
Shadow APIs: Understanding the Risk and 6 Ways to Reduce It

Shadow APIs: Understanding the Risk and 6 Ways to Reduce It

Comments
1 min read
đź§  iOS Reverse Engineering: iOS SQL Injection Challenge

đź§  iOS Reverse Engineering: iOS SQL Injection Challenge

Comments
4 min read
Strategic Security: New Features from 3MĂłr

Strategic Security: New Features from 3MĂłr

Comments
2 min read
đź§  iOS Reverse Engineering: Defeating Anti-Debug

đź§  iOS Reverse Engineering: Defeating Anti-Debug

Comments
4 min read
OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

6
Comments 1
4 min read
🔴 Chapter 01 – Setting Up a Ruby Environment (Line by Line for Beginners

🔴 Chapter 01 – Setting Up a Ruby Environment (Line by Line for Beginners

Comments
2 min read
Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Comments
3 min read
OWASP Top 10 For Flutter — M2: Inadequate Supply Chain Security in Flutter

OWASP Top 10 For Flutter — M2: Inadequate Supply Chain Security in Flutter

1
Comments
1 min read
Security is a risk function

Security is a risk function

Comments
1 min read
Hook, Hack, Defend: Frida’s Impact on Mobile Security & How to Fight Back

Hook, Hack, Defend: Frida’s Impact on Mobile Security & How to Fight Back

Comments
1 min read
Login Page for Modern Applications

Login Page for Modern Applications

1
Comments
6 min read
Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs

Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs

Comments
3 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Leveraging Large Language Models for Cross-Component Vulnerability Detection

Leveraging Large Language Models for Cross-Component Vulnerability Detection

Comments
3 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

4
Comments
6 min read
SQL Injection: the vulnerability that refuses to die

SQL Injection: the vulnerability that refuses to die

Comments
4 min read
Access Control Security: Learning from Major Data Breaches

Access Control Security: Learning from Major Data Breaches

Comments
5 min read
My VAPT Learning Journey

My VAPT Learning Journey

Comments
3 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
loading...