Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

medium.com

InfoSec Writeups - Medium

Get the latest updates from InfoSec Writeups - Medium directly as they happen.

Follow now 108 followers

Latest posts

Last updated 6 days ago

Securing AI Agents with Information Flow Control (Part I)

6 days ago

The Hidden Risks of AI Agents: Why Information Flow MattersThis three-part article...

A Practical Guide to Authentication and Session Management Vulnerabilities

7 days ago

A step-by-step breakdown of the most common Session Management VulnerabilitiesContinue reading on...

This article we will look into the vulnerability subdomain takeovers What makes a web app…

14 days ago

Let’s look into the subdomain takeover vulnerability, what makes a web app...

Reflected XSS with Base64 — Breaching Obscurity in Seconds

14 days ago

Why “security by obscurity” (yes, base64 too) is a bad idea —...

Uncovering Invisible Privileges: The Ultimate Guide to Mass-Assignment in Registration Flows

14 days ago

A practical walkthrough of how hidden JSON fields can expose privilege flaws...

$600 Bounty: Stored XSS in Jira Service Desk Reports

14 days ago

How a simple “Question” field turned into a Stored XSS that executed...

Information Disclosure in Revive Adserver v6.0.0

14 days ago

A single quote was all it took for verbose PHP errors to...

PicoCTF Challenges: Hashcrack

15 days ago

Hello Cyber Enthusiasts, welcome to this blog. Today I will go through...

Lab 1#: Basic clickjacking with CSRF token protection | Clickjacking Lab

15 days ago

PortSwigger LabHey my dear readers, Clickjacking (UI Redressing) is a web attack...

Secrets in JavaScript Files : What Hackers Extract

15 days ago

Hey there, 👋 — Vipul here from The Hacker’s Log.Have you ever...

How I Built a Robot That Finds Broken Authorization While I Sleep

15 days ago

Hey there!😁Continue reading on InfoSec Write-ups »