API API Security: Best Practices for Python Developers - Part II Part II of the Developer’s Guide for a secure API implementation. Devs are the core of web applications, that's why you should continue learning how to prevent common attacks and secure your endpoints correctly. Avoid deploying vulnerable code by taking into account these Security Best Practices. Oriana Olivetti 11 Jun 2024 · 7 min read
Why Dependency Security Is Your First Line of Defense Against Cyber Threats Explore the technical essentials of Software Composition Analysis (SCA) and dependency scanning, crucial tools for securing software against cyber threats in AI-driven development environments. Oriana Olivetti 29 May 2024 · 3 min read
prototype pollution Beginner’s Guide to Client Prototype Pollution vulnerabilities The perfect introduction for those wanting to understand Prototype Pollution vulnerabilities and exploits. Because not everyone knows how Objects in JavaScript work, but we are about to change that! Are you up for the challenge? Oriana Olivetti 15 May 2024 · 5 min read
CORS Pentesting Cross-Origin Resource Sharing (CORS) vulnerabilities Beginners guide to this common security misconfiguration. Here you'll find the steps to quickly spot and exploit CORS vulnerabilities out in the wild. Shall we start? Oriana Olivetti 30 Apr 2024 · 4 min read
SAST State of Security Automation SAST tools overlook more than 85% of CVEs in real-world scenarios. Outdated security automation can't keep pace with rapid code development. There is the hidden cost of security automation - validating false positives. Dawid Moczadło 9 Apr 2024 · 3 min read
secret detection The Developer's Guide to Effective Secrets Management Discover how to safeguard your applications with effective secrets management. Learn about the challenges of secrets detection and how Vidoc Security Lab's AI Security Engineer can revolutionize your security measures against AI-generated code threats. Oriana Olivetti 2 Apr 2024 · 3 min read
API API Security: Best Practices for Python Developers - Part I Developer’s Guide for a secure API implementation. Devs are the core of web applications, however, they are also the ones who end up introducing and deploying vulnerabilities that later get exploited. That's why you should know how to prevent common attacks and secure your endpoints correctly. Oriana Olivetti 26 Mar 2024 · 7 min read
SAST SAST vs. DAST: Choosing the Right Security Testing for Your Project Distinguishing between SAST & DAST is crucial for any robust security strategy. Adopting a unified approach, by leveraging both scans, ensures that your software remains secure during its lifecycle, effectively mitigating potential risks and vulnerabilities in today’s fast-paced digital environment. Oriana Olivetti 14 Mar 2024 · 3 min read
automated penetration testing AI Pentesting vs Automated Penetration Testing In the rapidly evolving cybersecurity landscape, where the emergence of AI-generated code presents unprecedented challenges, the concept of automated penetration testing emerges as a beacon of innovation and efficiency. Oriana Olivetti 29 Feb 2024 · 4 min read
Why you never get Reflected XSS to execute: Balancing Payloads Beginners guide to Reflected XSS. Everyone talks about the different XSS cheatsheets, and then you are supposed to try them one by one to see if any of the payloads get executed on your target. We don't like that. It's time-consuming and a mindless task. Oriana Olivetti 20 Feb 2024 · 4 min read
XSS AWS S3 Bucket Takeover - how to find it and maximize impact? The impact of an AWS S3 Bucket Takeover can range from none, account takeover, and even up to RCE. In this article, we’ll tell you how to find it and maximize its impact Greg 10 Jan 2024 · 6 min read
Security of new features in Next.js 14 - Server Actions, Taints Next.js 14 (and 13) introduced many attack vectors without providing the tooling necessary for organizations to detect them. It is easier than ever before to expose server secrets, introduce unauthenticated "endpoints" or any other issue that will make you vulnerable Dawid Moczadło 30 Oct 2023 · 5 min read
Tips Escalating debug mode in Django to RCE, SSRF, SQLi Security implications of DEBUG=true in Django. Learnings from an ethical hacker's perspective Dawid Moczadło 24 Oct 2023 · 3 min read
News Vidoc Secures Funding from bValue! Vidoc Security Lab has secured an investment from bValue, a leading player in the world of venture capital and technology innovation Klaudia 27 Sep 2023 · 2 min read
News Vidoc - Notifications and Collab Feature Release We implemented Notification and Collaboration features. How it works and how it can benefit your research Klaudia 6 Jun 2023 · 2 min read
Ultimate 401 and 403 bypass methods As a security researcher, I absolutely love the rush of discovering a suspicious endpoint during reconnaissance (which is super easy with Vidoc Research tool ;). It's exciting to think Klaudia 9 May 2023 · 7 min read
How we made $120k bug bounty in a year with good automation 2022 was very busy for several reasons, today we want to present to you what we did and learned doing large-scale bug bounty hunting Klaudia 6 Feb 2023 · 7 min read
Introducing the New and Improved Web-Based Security Tool TL;DR; - We improved Active Recon and data search option - Changed payments system to subscription model - Introduced Module-based security scanning with nuclei-like templates - Introduced Module Editor Klaudia 1 Feb 2023 · 5 min read
Why good Recon is hard, and how we make it easy What sucks the most about doing recon? — Bug Bounty Reports Explained (@gregxsunday) November 2, 2022 It all started with that one twitt ;) Inspired by Greg’s post we decided to Klaudia 3 Nov 2022 · 3 min read
Vidoc - a hacking platform TL;DR Vidoc platform will allow you to find new targets, test your payloads and collaborate with other professionals. The application security recon tool and scanner we are working on Klaudia 24 Sep 2022 · 3 min read
XSS Hacking Swagger-UI - from XSS to account takeovers We have reported more than 60 instances of this bug across a wide range of bug bounty programs including companies like Paypal, Atlassian, Microsoft, GitLab, Yahoo, ... Dawid Moczadło 16 May 2022 · 10 min read