To many security firms, a web application vulnerability assessment is a list of confirmed exploitabl...
Read More
I posted a silly tweet after finding a vulnerability in an Android app the other day. It grew...
Read More
The Verizon Data Breach Investigations Report is out. It's a good read.
https://www.verizonenterpris...
Read More
There are some neat developer and security events this spring that I'll be speaking at or otherwise...
Read More
I am testing an application that only works on Internet Explorer in compatibility mode. Before...
Read More
No, I haven't given up on my OTHER blog series about application vulnerability assessment but an opp...
Read More
I'll be doing a live webinar on Application Vulnerability Analysis on February 8 at 2PM EST - 1 mont...
Read More
Welcome to the 6th day of the C# Advent! Let's encrypt some malware.
That sounds horrible, but in se...
Read More
Reconnaissance means something different for pentesters as it does from vulnerability analysts. ...
Read More
All of this fancy organization and lists are just tools for the goal - making a list of everything t...
Read More
We live in a world where applications run the technology that we all use. There was, once, a t...
Read More
Bryant Maddrik at ABC6 interviewed me and Todd Whittaker at Franklin about the plight of the good gu...
Read More