Introduction Last year, I attended a job fair organized by the Association of Computer Science Students at ETH Zürich. It was a rewarding experience…

Read more

At Compass Security, we recently launched our managed bug bounty service. We openly invite hunters to probe our publicly exposed services for…

Read more

Authentication and authorization are critical components of any application. Various standards and frameworks have been developed to facilitate the…

Read more

This is hopefully the most useless blog post you will read this year as this post will detail our experience dealing with ransomware cases. It is one…

Read more

In this final part of this series, we are finally going to explain how the stack-based buffer overflow vulnerability can be exploited to gain…

Read more