HTTP Request Smuggling – TE.CL Vulnerability
I am continuing my blog series on HTTP Request Smuggling or HTTP Desync attacks. These vulnerabilities arise when there is[…]
Read morePlay for serendipity…
I am continuing my blog series on HTTP Request Smuggling or HTTP Desync attacks. These vulnerabilities arise when there is[…]
Read moreIn my preparation for taking the Burp Certified Professional test, I ran through the majority of the content on Web[…]
Read moreHelping a SOC Analyst get the data they need during an investigation is critical in helping drive down security incident[…]
Read morePerishable threat intelligence – when a new attacker enters the fray or when an existing threat actor changes their tactics,[…]
Read moreThe Internet seems to run on advertising – and that is fair. Companies and individuals need to find a way[…]
Read more