Author Archive

DevSec Selection #21 – WordPress Critical Authentication Bypass, Comparison of Enterprise SAST/DAST and Google Dorks for Bug Bounty

DevSec Selection Logo

Intro Hi everyone! I hope you’re doing great. Recently, we observed a number of high-severity vulnerabilities affecting various popular products.In this newsletter edition, you will find a couple of great technical vulnerability writeups presenting identified security issues with code examples. For anyone interested, I recommend an article about an authentication…

DevSec Selection #20 – Top Routinely Exploited Vulnerabilities in 2023 and Promising Open-source Tools

DevSec Selection Logo

Intro Hey everyone! In this edition, I highly recommend taking a look at the 2023 Top Routinely Exploited Vulnerabilities report from CISA, which highlights the most commonly exploited vulnerabilities over the past year. You’ll also find some fascinating researches, essential one-liner commands for bug bounty hunters, and some interesting open-source…

DevSec Selection #19 – Swiss Army Knife for DevSecOps, DEF CON 32 Talks, Okta Authentication Vulnerability

DevSec Selection Logo

Intro Hey everyone! I’m excited to bring you this edition packed with insightful cybersecurity materials. From powerful DevSecOps tools to thought-provoking industry discussions, there’s something for everyone this week. First up, let’s take a look at interesting Mixeway Flow, an open-source tool designed to be the Swiss army knife for…