Covering the most important file input validation techniques on the web, some attacks againts them, and highlight the importance of sanitizing data sent by the end user with a case study.
Why this new Log4j vulnerability is so dangerous? Hacked step by step until remote shell.
Covering a couple benefits of using feature flags in development from business and technical point of view as well.
After clicking on something, it becomes something else. Schrödinger is awake.