Git Monitoring How to Monitor GitHub for Secrets GraphQL Authorization Closing the Loop: Practical Attacks and Defences for GraphQL APIs Mobile Security The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections OAuth Hidden OAuth attack vectors Prototype Pollution Prototype Pollution and Bypassing Client Side HTML Sanitizers Prototype Pollution attack in NodeJS application Request Smuggling Security: HTTP Smuggling, Apache Traffic Server HTTP Request Smuggling – 5 Practical Tips h2c smuggling SAML On Breaking SAML: Be Whoever You Want To Be Server Side Template Injection Server Side Template Injection – on the example of Pebble Web Cache Deception Cached and Confused: Web Cache Deception in the Wild Zero Trust Architecture Zero Trust Architecture Draft Paper