code

Blog

Prompt Injection to RCE

Written by Harel Levy on


With the rapid adoption of large language models (LLMs), AI agents are becoming central to modern web applications. Companies across various industries are integrating AI agents into their platforms to… read more

Server-Side Prototype Pollution

Written by Bar Hajby on


While not as widely recognized as other web vulnerabilities, prototype pollution has gained significant attention in recent years due to its potential impact on both client-side and server-side applications. This… read more

PHP Type Juggling Vulnerability

Written by Harel Levy on


to PHP Juggling Vulnerability Understanding the PHP type juggling vulnerability is crucial for developers: PHP is one of the most popular backend programming languages suited explicitly for web development. Its… read more

Blind XSS to Complete Account Takeover

Written by Yuval Batan on


Applications’ security remains a constant challenge. Particular vulnerabilities pose significant risks when left unaddressed. One such threat is Cross-Site Scripting (XSS), a flaw that allows attackers to inject and execute… read more

Firebase Authentication Misconfiguration

Written by Sagiv Michael on


Firebase Authentication, a Google-provided solution, simplifies user authentication for web and mobile apps with support for email and password, social logins, phone verification, and anonymous sign-ins. It integrates seamlessly with… read more

Single Packet Attack: Race Condition

Written by Bar Hajby on


Race condition vulnerabilities pose significant and often underestimated threats that can lead to severe consequences. These issues arise when multiple threads or processes compete to access shared resources, resulting in… read more

Subdomain Takeover Attack

Written by Bar Hajby on


While not as widely recognized as other cybersecurity threats, subdomain takeover attacks have gained significant attention in recent years due to their potential to cause severe security breaches. These attacks… read more

Account Takeover via JWT Misconfiguration

Written by Sagiv Michael on


In the fast-evolving mobile app security world, vulnerabilities often slip under the radar, posing significant risks to users and organizations. During a recent mobile app assessment, our team discovered a… read more

Account Takeover via OTP Mechanism

Written by Sagiv Michael on


During a penetration test, we found a critical vulnerability that allows full account takeovers. The attack stems from severe flaws in the OTP (One-Time Password) mechanism. Specifically, the system returns… read more

LLM Prompt Injection

Written by Yuval Batan on


Large Language Models (LLMs) are advanced AI systems trained on massive datasets, enabling them to translate languages, create images, answer questions, and more. They power SaaS platforms, chatbots, virtual assistants,… read more

Contact Us Now to Improve Security