My First CVE, and the Dangers of Over-Logging2023-03-08·4 minsIxonaeSecurity Research Reverse Engineering Vulnerabilities
CSRF Vulnerability: How it Works and How to Prevent it?2020-09-13·6 minsIxonaeVulnerabilities Programming