Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
React CVE-2025-55182: Data Exfiltration Techniques and WAF Bypasses Overview (wallarm.com)
2 points by stepan_ 41 days ago | past
MCP vulnerabilities increased by 270% from Q2 to Q3 (wallarm.com)
4 points by stepan_ 79 days ago | past | 1 comment
One PUT Request to Own Tomcat: CVE-2025-24813 RCE Is in the Wild (wallarm.com)
2 points by heisenbit 10 months ago | past | 1 comment
Analyzing DeepSeek's System Prompt (wallarm.com)
3 points by noch 11 months ago | past
Analyzing DeepSeek's System Prompt: Jailbreaking Generative AI (wallarm.com)
2 points by stepan_ 11 months ago | past
Show HN: Agentless API Attack Surface Management (wallarm.com)
1 point by boris_dus on Sept 6, 2024 | past
What you need to know about The MOVEit and its impact. Latest (wallarm.com)
2 points by stepan_ on June 16, 2023 | past
A Simple Explanation of What a WebSocket Is (wallarm.com)
2 points by jjzhiyuan on Dec 6, 2022 | past
OWASP Top-10 2021. Statistics-based proposal (wallarm.com)
3 points by wlrm on Jan 18, 2021 | past
Cloudflare fixed HTTP/2 vulnerability (wallarm.com)
1 point by wlrm on Oct 17, 2020 | past
Socket.io zero-day exploited in the wild (CVE-2020-24807) (wallarm.com)
2 points by stepan_ on Oct 8, 2020 | past | 1 comment
JWT heartbreaker, a Burp extension that finds thousands weak secrets (wallarm.com)
1 point by wlrm on Oct 5, 2020 | past
Weak JWT secrets you should know (wallarm.com)
2 points by wlrm on Sept 3, 2020 | past
Blind SSRF Exploitation (wallarm.com)
2 points by i_bo0om on Feb 11, 2020 | past
New Security Risk: GraphQL Batching Attack (wallarm.com)
2 points by wlrm on Dec 13, 2019 | past
Race Condition in Web Applications (wallarm.com)
1 point by i_bo0om on Oct 31, 2019 | past
PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise (wallarm.com)
1 point by Daviey on Oct 29, 2019 | past
Machine Learning On-Line Hackathon: Detect Malicious Intent (wallarm.com)
4 points by stepan_ on Nov 29, 2018 | past
Neatly Bypassing Content Security Policy (wallarm.com)
104 points by wlrm on July 12, 2018 | past | 36 comments
Neatly bypassing CSP. Why 'unsafe-inline' is almost always a full-fledged XSS (wallarm.com)
3 points by i_bo0om on July 10, 2018 | past
Neural Architecture Search with Reinforcement Learning Using TensorFlow (wallarm.com)
2 points by stepan_ on Dec 18, 2017 | past
Reflected Cross-Site scripting via HTTP headers in Safari browser (wallarm.com)
2 points by i_bo0om on Dec 14, 2017 | past
HOWTO: Prevent your secrets being exposed in code repositories (wallarm.com)
2 points by stepan_ on Nov 28, 2017 | past
How to use a single download to remotely steal proprietary files from MacOS (wallarm.com)
2 points by tzury on Aug 6, 2017 | past
How to use a single download to remotely steal proprietary files from MacOS (wallarm.com)
2 points by ingve on Aug 4, 2017 | past
How to use a single download to remotely steal proprietary files from MacOS (wallarm.com)
2 points by nl5887 on Aug 3, 2017 | past
Hunting the Files Safari local file reader (wallarm.com)
4 points by i_bo0om on Aug 2, 2017 | past
New Struts2 Remote Code Execution Exploit Caught in the Wild (wallarm.com)
2 points by wlrm on March 9, 2017 | past
Neuraldrugs. The idea is to emulate the impact of drugs on a Neural Network (wallarm.com)
3 points by wlrm on Jan 27, 2017 | past
Show HN: Wallarm – Protect your web apps or APIs with fast Nginx-based instances (wallarm.com)
95 points by stepan_ on June 29, 2016 | past | 84 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: