| | React CVE-2025-55182: Data Exfiltration Techniques and WAF Bypasses Overview (wallarm.com) |
| 2 points by stepan_ 41 days ago | past |
|
| | MCP vulnerabilities increased by 270% from Q2 to Q3 (wallarm.com) |
| 4 points by stepan_ 79 days ago | past | 1 comment |
|
| | One PUT Request to Own Tomcat: CVE-2025-24813 RCE Is in the Wild (wallarm.com) |
| 2 points by heisenbit 10 months ago | past | 1 comment |
|
| | Analyzing DeepSeek's System Prompt (wallarm.com) |
| 3 points by noch 11 months ago | past |
|
| | Analyzing DeepSeek's System Prompt: Jailbreaking Generative AI (wallarm.com) |
| 2 points by stepan_ 11 months ago | past |
|
| | Show HN: Agentless API Attack Surface Management (wallarm.com) |
| 1 point by boris_dus on Sept 6, 2024 | past |
|
| | What you need to know about The MOVEit and its impact. Latest (wallarm.com) |
| 2 points by stepan_ on June 16, 2023 | past |
|
| | A Simple Explanation of What a WebSocket Is (wallarm.com) |
| 2 points by jjzhiyuan on Dec 6, 2022 | past |
|
| | OWASP Top-10 2021. Statistics-based proposal (wallarm.com) |
| 3 points by wlrm on Jan 18, 2021 | past |
|
| | Cloudflare fixed HTTP/2 vulnerability (wallarm.com) |
| 1 point by wlrm on Oct 17, 2020 | past |
|
| | Socket.io zero-day exploited in the wild (CVE-2020-24807) (wallarm.com) |
| 2 points by stepan_ on Oct 8, 2020 | past | 1 comment |
|
| | JWT heartbreaker, a Burp extension that finds thousands weak secrets (wallarm.com) |
| 1 point by wlrm on Oct 5, 2020 | past |
|
| | Weak JWT secrets you should know (wallarm.com) |
| 2 points by wlrm on Sept 3, 2020 | past |
|
| | Blind SSRF Exploitation (wallarm.com) |
| 2 points by i_bo0om on Feb 11, 2020 | past |
|
| | New Security Risk: GraphQL Batching Attack (wallarm.com) |
| 2 points by wlrm on Dec 13, 2019 | past |
|
| | Race Condition in Web Applications (wallarm.com) |
| 1 point by i_bo0om on Oct 31, 2019 | past |
|
| | PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise (wallarm.com) |
| 1 point by Daviey on Oct 29, 2019 | past |
|
| | Machine Learning On-Line Hackathon: Detect Malicious Intent (wallarm.com) |
| 4 points by stepan_ on Nov 29, 2018 | past |
|
| | Neatly Bypassing Content Security Policy (wallarm.com) |
| 104 points by wlrm on July 12, 2018 | past | 36 comments |
|
| | Neatly bypassing CSP. Why 'unsafe-inline' is almost always a full-fledged XSS (wallarm.com) |
| 3 points by i_bo0om on July 10, 2018 | past |
|
| | Neural Architecture Search with Reinforcement Learning Using TensorFlow (wallarm.com) |
| 2 points by stepan_ on Dec 18, 2017 | past |
|
| | Reflected Cross-Site scripting via HTTP headers in Safari browser (wallarm.com) |
| 2 points by i_bo0om on Dec 14, 2017 | past |
|
| | HOWTO: Prevent your secrets being exposed in code repositories (wallarm.com) |
| 2 points by stepan_ on Nov 28, 2017 | past |
|
| | How to use a single download to remotely steal proprietary files from MacOS (wallarm.com) |
| 2 points by tzury on Aug 6, 2017 | past |
|
| | How to use a single download to remotely steal proprietary files from MacOS (wallarm.com) |
| 2 points by ingve on Aug 4, 2017 | past |
|
| | How to use a single download to remotely steal proprietary files from MacOS (wallarm.com) |
| 2 points by nl5887 on Aug 3, 2017 | past |
|
| | Hunting the Files Safari local file reader (wallarm.com) |
| 4 points by i_bo0om on Aug 2, 2017 | past |
|
| | New Struts2 Remote Code Execution Exploit Caught in the Wild (wallarm.com) |
| 2 points by wlrm on March 9, 2017 | past |
|
| | Neuraldrugs. The idea is to emulate the impact of drugs on a Neural Network (wallarm.com) |
| 3 points by wlrm on Jan 27, 2017 | past |
|
| | Show HN: Wallarm – Protect your web apps or APIs with fast Nginx-based instances (wallarm.com) |
| 95 points by stepan_ on June 29, 2016 | past | 84 comments |
|
|
| More |