Andy InfoSecOWASP API Top 10 — Part 2Due to the widespread usage of APIs, and the fact that attackers realize APIs are a new attack frontier, the OWASP API Security Top 10…6 min read·Oct 13, 2020----
Andy InfoSecProblems faced by bug bounty hunters while disclosing bugsBug bounty7 min read·Oct 6, 2020----
Andy InfoSecThe emergence of CTF in the world of Cyber SecurityTraditionally speaking ‘CTF’ is a term used for an outdoor game where the goal is to capture the other team’s flag. Similarly, this term…4 min read·Oct 4, 2020----
Andy InfoSecThe $50,000 Android Banking Trojan:Analysis of the Cerberus source code leak7 min read·Sep 28, 2020----