Blog

By category:
Sławomir Zakrzewski

This article explores the root causes of NullPointerExceptions in Java and how Kotlin’s built-in null safety mechanisms offer a cleaner, safer alternative. Through practical code examples and real-world patterns, we compare both languages and highlight Kotlin’s advantages in writing more robust and maintainable code.

Michał Majchrowicz

This blog post uncovers critical vulnerabilities like Insecure Design, remote script loading, and NTLM hash theft.

Maksymilian Kubiak

In our latest research, we discovered four critical vulnerabilities in Symfonia eDokumenty (formerly Ready_TM), including Remote Code Execution, SQL Injection, and more. This case illustrates why consistent and thorough security testing is essential for applications handling sensitive data.

Karol Mazurek

TCC on macOS isn’t just an annoying prompt—it’s the last line of defense between malware and your private data. This article breaks down how TCC works, why third-party developers must take bypass vulnerabilities seriously, and how seemingly minor flaws can open the door to real-world attacks. Written from the perspective of both attacker and defender, it’s a must-read for app developers and security researchers alike.

Sławomir Zakrzewski

This article explains how SQL injection vulnerabilities can still occur in applications using modern ORM frameworks. It describes how to identify insecure patterns and write safer code, providing practical examples to illustrate common pitfalls and secure practices.

Karol Mazurek

How broken access and Null Pointer Dereference was found in macOS IOMobileFramebuffer (AppleCLCD2) service.

voip-featured-image
Zbigniew Piotrak

VoIP is transforming business communication with flexibility and cost savings. However, its reliance on the internet brings cybersecurity risks. Discover how VoIP works, common threats, and the role of penetration testers in protecting organizations.

Paweł Zdunek

Invoker is a Burp Suite extension that automates external tools like dosfiner, sqlmap, nuclei, or ffuf, bridging the gap between captured requests and CLI commands.

Michał Majchrowicz

Explore how Windows API functions like GetWindowTextA and WM_GETTEXT can be used to interact with SAP GUI controls using Python. Whether retrieving window titles, extracting hidden text, or analyzing user input fields, these methods provide valuable insights for enhancing the security of SAP systems with penetration tests.

Karol Mazurek

Technical analysis of NULL Pointer Dereference bugs, mitigations, and exploit development challenges on Apple Silicon macOS.

Is your company secure online?

Join our list of satisfied customers and safeguard your company’s data!

Trust us and leave your contact details. Our team will contact you to discuss the details and prepare a tailor-made offer for you. Full discretion and confidentiality of your data are guaranteed.

Willing to ask a question immediately? Visit our Contact page.