Blog post
Exploiting Untrusted Objects through Deserialization: Analyzing 1 of 100+ HPE Bug Submissions
- December 01, 2017
Blog post
Simple to Find, Simple to Fix – Locating Weak File Permissions in Advantech WebAccess
- September 13, 2017
Blog post
The Blue Frost Security Challenge: An Exploitation Journey for Fun and Free Drinks
- August 10, 2017