Category: blog

WhatsApp for Android Retains Deleted Contacts Locally

Summary WhatApp for Android retains contact info locally after contacts get deleted. This would allow an […]

Recommendations for Parents about Cyber Bullying

Here are some dedicated tips for keeping younger children safe online. One of these training tips […]

Open Redirect Vulnerability in Substack

Summary Substack had a open redirect vulnerability in their login flow which would have allowed an […]

Speaking @Appsec_Village @DEFCON 29

Our talk titled “The Poisoned Diary: Supply Chain Attacks on Install Scripts” was accepted at this […]

Firebase CLI Installer Making Calls to Google Analytics

Firebase is a mobile and web application development platform provided by Google. One of the tools […]

New Tools for Addressing Supply Chain Attacks

In the recent codecov.io security incident, an attacker modified a shell script used by a common […]

1 7 8 9