Mayank Deshmukh January 16, 2023January 18, 2023 - 4 min read Detection of Vulnerabilities in JavaScript Libraries
Dingjie Yang July 21, 2016September 6, 2020 - 6 min read Handling Cross-Site Scripting As Attacks Get More Sophisticated
Ashish Kamble June 16, 2015September 6, 2020 - 10 min read Device Vulnerabilities Fixed: Garrettcom Magnum Series
Jerome Clauzade May 6, 2015September 7, 2020 - 4 min read WordPress: When Half of all Websites are Vulnerable
Dingjie Yang February 19, 2015January 27, 2021 - 5 min read How a Missing Security Check Enabled a CSRF Attack
Dingjie Yang October 9, 2014September 7, 2020 - 6 min read Identify Threats in Frameworks that your Application Relies on with Qualys Web Application Scanning
Dingjie Yang September 11, 2014February 1, 2021 - 6 min read XSS Vulnerability Shows How Security Issues Can Creep into Popular Software
Xiaoran Dong April 19, 2013February 1, 2021 - 6 min read Using Java Decompilers to Find Security Holes