Andy InfoSecOWASP API Top 10 — Part 2Due to the widespread usage of APIs, and the fact that attackers realize APIs are a new attack frontier, the OWASP API Security Top 10…Oct 13, 2020Oct 13, 2020
Andy InfoSecProblems faced by bug bounty hunters while disclosing bugsBug bountyOct 6, 2020Oct 6, 2020
Andy InfoSecThe emergence of CTF in the world of Cyber SecurityTraditionally speaking ‘CTF’ is a term used for an outdoor game where the goal is to capture the other team’s flag. Similarly, this term…Oct 4, 2020Oct 4, 2020
Andy InfoSecThe $50,000 Android Banking Trojan:Analysis of the Cerberus source code leakSep 28, 2020Sep 28, 2020