News

The latest data breach amounts to 16 billion credentials leaked. Password hygiene becomes paramount, and Bitwarden can help ...
Aiming at the demand for information system password encryption protection, this paper proposed a new set of password storage and transmission encryption model. In the process of password storage ...
Control flow integrity (CFI) plays an important role in defending against code reuse attacks (CRA). It protects the program's control flow from being hijacked by restricting control flow transfers ...
Application security best practices and code implementations for Java developers. This project is intended for didactic purposes only, supporting my training course.
The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056, involved weak or absent encryption in the input history function of SAP GUI for Windows and SAP GUI for Java, exposing sensitive ...