30 vulnerabilities to look out for in Java applications: Arbitrary file writes, directory traversal, deserialization, and more…

Photo by Cookie the Pom on Unsplash

Using Ocular to search for reflected XSS in an application

How XSS happens

The top ten vulnerabilities that threaten your API, how to identify them, and how to prevent them

Top ten vulnerabilities that threaten your API, how to identify them, and how to prevent them

And four principles for securing your organization’s information including your source code and supply chain

Photo by Caspar Camille Rubin on Unsplash

Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store