We use cookies to ensure our website works properly and to enhance your experience. By continuing to visit this site, you agree to our use of cookies for traffic analysis, personalized advertising, and more. For more details, see our Cookie Notice.
Blog
Stay updated with the latest offensive security news, knowledge, and resources.
Explore common pitfalls in Java and C# reflection practices—understand how insecure use of reflection can expose applications to vulnerabilities like code injection, unauthorized access, and bypassed security controls, and learn key strategies to harden your code.
In his chat with Casey, recorded at RSA 2025, Tim shares hard-earned insights about building effective security programs in established organizations while navigating the complexities of rapid AI development and multi-compliance requirements.
At RSA 2025, Vivek Menon, CISO & Head of Data at Digital Turbine, explains why his team abandoned annual penetration testing in favor of quarterly cycles that actually catch vulnerabilities when they matter.