Minded Security Blog
订阅

最新

1. Bypassing Certificate Pinning on Flutter-based Android Apps. A new guide. Certificate Pinning ‧ Christian Cotignola (@b4dsheep)
2. Semgrep Rules for iOS Application Security (Swift) iOS ‧ Maurizio Siddu
3. Testing the Security of Modbus Services Stefano Di Paola
4. Semgrep Rules for Android Application Security Android Security ‧ Riccardo Cardelli
5. A Cool New Project: Semgrep Rules for Android Apps Security Android Security ‧ Stefano Di Paola
6. 20 years of Software Security: threats and defense strategies evolution Matteo Meucci
7. OWASP Global AppSec Dublin 2023: WorldWide and Threat Modeling OWASP ‧ Matteo Meucci
8. UN ECE 155 Threats in the real world: Wireless Networking Attacks and Mitigations. A case study Automotive ‧ Stefano Di Paola
9. The Worst Log Injection. Ever. (Log4j [2.0.0-alpha,2.14.1] ) appsec ‧ Stefano Di Paola
10. A Journey Into the Beauty of DNSRebinding - Part 2 DeviceSecurity ‧ Anonymous
11. Mobile Screenshot Prevention Cheatsheet - Testing and Fixing Android Security ‧ Martino Lessio
12. A Journey Into the Beauty of DNSRebinding - Part 1 DeviceSecurity ‧ Alessandro Braccio
13. Demystifying Web Cache Threats Application Security ‧ Giorgio Rando
14. WAF Journey - Fixing Telerik UI Remote Code Execution via Arbitrary File Upload Supply Chain Security ‧ Anonymous
15. Mobile Screenshot prevention Cheat Sheet - Risks and Scenarios Android Security ‧ Martino Lessio
16. Implementing Secure Biometric Authentication on Mobile Applications Android ‧ Michele Tumolo
17. Behave! A monitoring browser extension for pages acting as "bad boi". Stefano Di Paola
18. Remote Working - Web Chats: Threats and countermeasures chat ‧ Fabrizio Bugli
19. OWASP SAMM v2: lessons learned after 9 years of assessment Matteo Meucci
20. How to Path Traversal with Burp Community Suite blackbox ‧ Enrico Aleandri
21. A practical guide to testing the security of Amazon Web Services (Part 3: AWS Cognito and AWS CloudFront) Federico De Meo
22. Secure Development Lifecycle: the SDL value evolution. Part 1 compliance ‧ Anonymous
23. Secure Development Lifecycle: the SDL value evolution. Part 2 DEVSECOPS ‧ Anonymous
24. How to prevent Path Traversal in .NET absolute path check ‧ Giorgio Fedon
25. From Path Traversal to Source Code in Asp.NET MVC Applications asp.net ‧ Fabrizio Bugli
更新于 27 分钟前

近期历史最近 100 条记录

2024-05-07 Bypassing Certificate Pinning on Flutter-based Android Apps. A new guide. Certificate Pinning ‧ Christian Cotignola (@b4dsheep)
2024-04-17 Semgrep Rules for iOS Application Security (Swift) iOS ‧ Maurizio Siddu
2023-06-22 A Cool New Project: Semgrep Rules for Android Apps Security Android Security ‧ Stefano Di Paola
2023-03-27 20 years of Software Security: threats and defense strategies evolution Matteo Meucci
2023-02-24 OWASP Global AppSec Dublin 2023: WorldWide and Threat Modeling OWASP ‧ Matteo Meucci
2022-07-28 UN ECE 155 Threats in the real world: Wireless Networking Attacks and Mitigations. A case study Automotive ‧ Stefano Di Paola
2021-12-14 The Worst Log Injection. Ever. (Log4j [2.0.0-alpha,2.14.1] ) appsec ‧ Stefano Di Paola
2021-08-31 A Journey Into the Beauty of DNSRebinding - Part 2 DeviceSecurity ‧ Anonymous
2021-05-27 Mobile Screenshot Prevention Cheatsheet - Testing and Fixing Android Security ‧ Martino Lessio
2021-02-26 A Journey Into the Beauty of DNSRebinding - Part 1 DeviceSecurity ‧ Alessandro Braccio
2021-01-26 Demystifying Web Cache Threats Application Security ‧ Giorgio Rando
2020-12-06 Secure Development Lifecycle: the SDL value evolution. Part 1 compliance ‧ Anonymous
2020-12-06 How to prevent Path Traversal in .NET absolute path check ‧ Giorgio Fedon
2020-12-06 From Path Traversal to Source Code in Asp.NET MVC Applications asp.net ‧ Fabrizio Bugli
2020-12-06 Pentesting IoT devices (Part 2: Dynamic Analysis) Lorenzo Comi
2020-12-06 A practical guide to testing the security of Amazon Web Services (Part 2: AWS EC2) Federico De Meo
2020-12-06 A practical guide to testing the security of Amazon Web Services (Part 1: AWS S3) Federico De Meo
2020-12-06 Pentesting IoT devices (Part 1: Static Analysis) Lorenzo Comi
2020-12-06 Microservices Security: Dos and Dont's agile ‧ Stefano Di Paola
2020-12-06 Antitamper Mobile - Minded Security's Magik Quadrant for Mobile Code Protection (2018 Edition) Android Security ‧ Anonymous
2020-12-06 Shhlack, message encryption for Slack Encryption ‧ Stefano Di Paola
2020-12-06 DOM XSS in Google VRView library Federico Fazzi
2020-12-06 JavaScript security and tools evolution talk at OWASP Taiwan Week 2017 blueclosure ‧ David Cervigni
2020-12-06 OWASP Summit 2017: what's new? OWASP ‧ Matteo Meucci
2020-12-06 RCE in Oracle NetBeans Opensource Plugins: PrimeFaces 5.x Expression Language Injection Arbitrary Code Execution ‧ Giorgio Fedon
2020-12-06 RAT WARS 2.0: Advanced Techniques for Detecting RAT Screen Control Banking Malware ‧ Unknown
2020-12-06 Request parameter "_method" may lead to CakePHP CSRF Token Bypass Giorgio Fedon
2020-12-06 WAF Journey - Fixing Telerik UI Remote Code Execution via Arbitrary File Upload Supply Chain Security ‧ Anonymous
2020-12-06 Mobile Screenshot prevention Cheat Sheet - Risks and Scenarios Android Security ‧ Martino Lessio
2020-12-06 Implementing Secure Biometric Authentication on Mobile Applications Android ‧ Michele Tumolo
2020-12-06 Behave! A monitoring browser extension for pages acting as "bad boi". Stefano Di Paola
2020-12-06 Remote Working - Web Chats: Threats and countermeasures chat ‧ Fabrizio Bugli
2020-12-06 OWASP SAMM v2: lessons learned after 9 years of assessment Matteo Meucci
2020-12-06 How to Path Traversal with Burp Community Suite blackbox ‧ Enrico Aleandri
2020-12-06 A practical guide to testing the security of Amazon Web Services (Part 3: AWS Cognito and AWS CloudFront) Federico De Meo
2020-12-06 Secure Development Lifecycle: the SDL value evolution. Part 2 DEVSECOPS ‧ Anonymous

匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选