Author Archive

DevSec Selection #28 – Auth Bypass in Next.js, IngressNightmare K8s RCE, TRAIL Threat Modeling

DevSec Selection Logo

Intro Hi everyone! I hope you had a great weekend. This edition starts with IngressNightmare — a series of vulnerabilities that may lead to unauthenticated remote code execution in Kubernetes. The linked article thoroughly presents the exploitation process and requirements to perform an effective attack. If you work with Next.js,…

DevSec Selection #21 – WordPress Critical Authentication Bypass, Comparison of Enterprise SAST/DAST and Google Dorks for Bug Bounty

DevSec Selection Logo

Intro Hi everyone! I hope you’re doing great. Recently, we observed a number of high-severity vulnerabilities affecting various popular products.In this newsletter edition, you will find a couple of great technical vulnerability writeups presenting identified security issues with code examples. For anyone interested, I recommend an article about an authentication…