PinnedInon ShkedyA Deep Dive On The Most Critical API Vulnerability — BOLAIntro16 min read·Nov 5, 2019--6--6
Inon ShkedyOWASP API Top 10 for Dummies — Part #2Welcome back to our blog series on the OWASP API Top 10! This is continued from Part I. If you haven’t read the first part, check it out…5 min read·Nov 27, 2022----
Inon ShkedyLog4Shell — Simple Techincal Explanation of the ExploitLast week’s Log4Shell vulnerability is a dramatic example of how modern applications, interconnected services and pervasive APIs can…6 min read·Dec 17, 2021----
Inon ShkedyHacking your mind — Mindfulness Journey from a hacker perspectiveIntro9 min read·Sep 23, 2021--1--1
Inon Shkedy31 Tips — Advanced Bug Bounty & PentestingTo welcome Blackhat & Defcon conferences, we published a daily tip on Bug Bounty & AppSec during the month of July 2021.2 min read·Aug 23, 2021----
Inon ShkedyBehind the Scenes of SAST — The Challenges of Code ScanningI love the idea behind Static Application Security Testing (SAST) tools — they aim to create a utopian world clean from application…7 min read·Apr 19, 2021--2--2
Inon ShkedyBehind the Scenes of DAST — How do Security Scanners Work ?The idea behind Dynamic Applications Security Testing (DAST) is pretty clever — a tool that simulates a human penetration tester. With the…7 min read·Mar 16, 2021----
Inon ShkedyModern Application Security — Good and Bad NewsThis is the second article in a 2-part blog series. In the previous article, we talked about the major changes in application development…4 min read·Aug 26, 2020----
Inon ShkedyModern Application Security — What are Modern Applications?What are Modern Applications?6 min read·Aug 26, 2020----