Hide filtersShow filters × Close ArticlesApril 6, 2023Celebrating two years of HN Securityby Marco Ivaldi ArticlesExploitsFebruary 27, 2023Abusing Maven’s pom.xmlby Gianluca Baldi ExploitsVulnerabilitiesJanuary 18, 2023Nothing new under the Sun – Discovering and exploiting a CDE bug chainby Marco Ivaldi ArticlesDecember 21, 2022A journey into IoT – Unknown Chinese alarm – Part 4 – Internal communicationsby Federico Dotta ToolsNovember 22, 2022Burp Suite and Protobufby Federico Dotta ToolsOctober 12, 2022Semgrep rules for Kotlin security assessmentby Federico Dotta ArticlesExploitsSeptember 7, 2022Groovy Template Engine Exploitation – Notes from a real case scenarioby Gianluca Baldi ArticlesVulnerabilitiesExploitsAugust 22, 2022Useless path traversals in Zyxel admin interface (CVE-2022-2030)by Maurizio Agazzini ArticlesAugust 5, 2022A journey into IoT – Unknown Chinese alarm – Part 3 – Radio communicationsby Federico Dotta