Oftentimes when reversing a binary file we encounter the scenario where it doesn’t have symbols and end up with a lot of unnamed…
1. Introduction
Jenkins is a widely used tool for automating tasks like building, testing, and deploying software. It’s a key part…
In this post we describe an analysis of the security patches introducted by GitHub Enterprise Server (GHES) release 3.11.3 [1]. It covers…
During a pentest engagement we found a Java application vulnerable to unsafe reflection [1]. This application allowed us to instantiate an…
Welcome to the world of Web Application and API Protection (WAAP), an advanced security approach that is revolutionizing the protection of…
Primeiramente, bem-vindo ao mundo da Proteção de Aplicativos Web e API (WAAP – Web Application and API Protection), uma abordagem…
As artificial intelligence (AI) becomes more and more present in our daily lives, it has become crucial to consider the potential risks and…
À medida que a inteligência artificial (IA) se torna cada vez mais presente em nosso dia a dia, tem se tornado crucial considerar os…
Nowadays a very common practice is to integrate security scans during the continuous integration and continuous delivery (CI/CD) phase of…
