2025  10

April  8

Detection Frameworks and Latest Methodologies for eBPF-Based Backdoors

April 28, 2025 · 14 min · 2960 words

In-Depth Report on Telecommunication Security: SKT Breach and Global Case Studies

April 28, 2025 · 5 min · 864 words

CVE-2019-17570 Apache XML-RPC Vulnerability Analysis Report

April 24, 2025 · 2 min · 360 words

Is Your Data in the Cat’s Paws?

April 21, 2025 · 6 min · 1156 words

There’s No Such Thing as a Free Lunch, But Security Was Free

April 17, 2025 · 3 min · 478 words

In the AI Era, Employees Are Isolated and Organizations Thrive

April 7, 2025 · 2 min · 317 words

The Place of Humans: Declaring the Creator’s Rights in the Age of AI

April 3, 2025 · 3 min · 454 words · windshock

Common Security Myths Developers Tell Themselves

April 1, 2025 · 3 min · 507 words

March  2

How to Block ECH and Mitigate DoH in Enterprise Networks

March 31, 2025 · 3 min · 468 words

XML-RPC Security Vulnerabilities Analysis and Mitigation Strategies

March 28, 2025 · 4 min · 657 words

2024  4

November  1

Review of Citrix Security Policy Effectiveness

November 5, 2024 · 3 min · 469 words

June  2

KPIs Can Cause Incidents!!!

June 20, 2024 · 2 min · 402 words

Common Misconceptions of Security Assessors

June 16, 2024 · 3 min · 550 words

May  1

Can Development Culture Influence Security Levels?

May 22, 2024 · 5 min · 952 words

2023  2

April  2

Bypassing citrix policy is not a vulnerability, but it can be a violation of the law

April 27, 2023 · 5 min · 989 words

Strengthening cybersecurity through government ngos and bug bounty programs

April 18, 2023 · 3 min · 563 words

2019  2

September  1

Security threats and mitigation strategies for java reflection

September 3, 2019 · 5 min · 1055 words

August  1

About the XSSAudit

August 8, 2019 · 2 min · 336 words