Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Reproducing the vulnerabilities documented in a pentest report is a common engineering pain point. But aligning developer skills with the tooling used during the pentest can help confirm issues faster, and deploy fixes faster. The Tools Of The Trade Bu… Continue reading Developing Like A Pentester – (And How To Reproduce Any Vulnerability)

Understanding jQuery Security

Application Penetration Testing The jQuery Security Model Explained jQuery is a JavaScript UI framework which provides an abstraction layer to many DOM manipulation functions. It provides developers with a friendly interface to quickly and dynamically update DOM without reloading the entire page. It’s a surprisingly simple concept but has given way to a new model […]

More posts like this can be found at Virtue Security.

Continue reading Understanding jQuery Security