In Depth

[InDepth#16] According to random folks on the internet (i.e. social media), "insecure functions" are a wide and varied concept. Let's take a look at the…
[InDepth#15] There is a false confidence about mass-assignment vulnerabilities that hides how easy it is for them to occur and be exploited...
[InDepth#14] Cryptographically secure randomness is important, but so is backwards compatibility...
[InDepth#13] The story of why a bugfix I was so confident in was doomed to fail...
[InDepth#12] In November 2022, Steve McDougall published a tutorial called "Creating a Password Generator"... we're going to audit his code!
1
It's a three-in-one for the third last entry into our OWASP Top 10 series!
From Insecure Design last week to Insecure Configuration this week!
Let's dive into the first risk in the OWASP Top 10...
[InDepth#11] Also known as hide-and-seek, and security through obscurity! Challenge yourself with the new IDOR challenges in our intentionally…
2
[InDepth#10] One time codes, magic links, and more...
1
[InDepth#9] One of the many awesome and completely underrated Laravel security features.
1
[InDepth#8] Policy Objects are incredibly powerful. Use them.