Vídeo novo no canal!
Links
Splitting the email atom: exploiting parsers to bypass access controls
TruffleHog Now Analyzes Permissions Of API Keys and Passwords
How did Facebook intercept their competitor's encrypted mobile app traffic?
Fast, Cheap and Good | An Unusual Trade-off Available in Threat Modeling by Adam Shostack