VbD

Security Research

Explore our collection of in-depth security research, vulnerability disclosures, and technical analysis from our team of security researchers.

Vulnerabilities
Exploits
Web Security
Network

Featured Research

Vulnerability
Enterprise
Critical

Exploiting Log4j Vulnerabilities in Enterprise Systems

A comprehensive analysis of the Log4j vulnerability (CVE-2021-44228) and how it can be exploited in various enterprise environments.

Sarah Johnson
May 15, 2023
12 min read
4,328
56
Exploiting Log4j Vulnerabilities in Enterprise Systems

Latest Research

Breaking Down the Latest Chrome Zero-Day Exploit
Browser Security
Zero-Day

Breaking Down the Latest Chrome Zero-Day Exploit

An in-depth analysis of the recent Chrome zero-day vulnerability and how it was exploited in the wild.

Michael Chen
June 2, 2023
Secure Code Review: Finding SQL Injection Vulnerabilities
Code Review
SQL Injection

Secure Code Review: Finding SQL Injection Vulnerabilities

Learn how to identify and prevent SQL injection vulnerabilities during code review processes.

Alex Rodriguez
May 28, 2023
IoT Security: Vulnerabilities in Smart Home Devices
IoT
Smart Home

IoT Security: Vulnerabilities in Smart Home Devices

Exploring common security flaws in popular smart home devices and how they can be exploited.

Emma Wilson
May 20, 2023
Reverse Engineering Android Applications for Security Vulnerabilities
Mobile Security
Android

Reverse Engineering Android Applications for Security Vulnerabilities

A step-by-step guide to reverse engineering Android apps to discover potential security issues.

David Kim
May 12, 2023
Cloud Misconfigurations: The Silent Security Threat
Cloud Security
AWS

Cloud Misconfigurations: The Silent Security Threat

How common cloud misconfigurations can lead to major security breaches and how to prevent them.

Priya Patel
May 5, 2023
OWASP Top 10: Understanding API Security Risks
API Security
OWASP

OWASP Top 10: Understanding API Security Risks

A deep dive into the OWASP API Security Top 10 and practical mitigation strategies.

James Wilson
April 28, 2023