You are here:
At Compass Security, we recently launched our managed bug bounty service. We openly invite hunters to probe our publicly exposed services for…
Authentication and authorization are critical components of any application. Various standards and frameworks have been developed to facilitate the…
This is hopefully the most useless blog post you will read this year as this post will detail our experience dealing with ransomware cases. It is one…
In this final part of this series, we are finally going to explain how the stack-based buffer overflow vulnerability can be exploited to gain…
In this fourth part of the series, we analyze the memory corruption identified previously and manage to overwrite the program pointer!
Young professionals, industry and business network at Career Day "Engineering & Computer Science".
How do social engineering attacks work? In «Beobachter», the Swiss magazine for law and justice, Ivano Somaini talks about his unusual everyday life…
More blog posts