News & Resources
OWASP Top 10: What It Is and How It Can Help Your Business
One of the worst things a business owner can find out is that their business got hacked. And those that do discover the breach are the lucky ones. If you found yourself in that situation of having failed to protect the sensitive data of your clients, you’d most...
Why Penetration Testing Is Essential for Your Business
Even if we aren’t always aware of it, cybersecurity plays an important role in our lives. Almost every little detail about ourselves is out there (hopefully safe) in this digital world we have adopted as our second home. When it comes to businesses, the story gets a...
I Am a White Hacker and I Want to Help Businesses Improve Their Cybersecurity
TL;DR My name is Alexandru Colțuneac and I am a white hacker and Co-Founder of LooseByte, a cybersecurity company from Romania I have found and reported vulnerabilities in Google, Microsoft, eBay, Adobe, Facebook, Paypal, UBER Through my work, I want to change...
Individual security researches done by our specialists
Microsoft OAuth Interface Vulnerability
In this article, I want to talk about one of the vulnerabilities that I found during one of my security researches, namely a Stored XSS(Cross-Site-Scripting) flaw in Microsoft OAuth Interface. My experience as a researcher with this company started several years ago...
Google Cloud Blog Platform Vulnerability
In today’s post, we will talk with you about an interesting security vulnerability that we’ve found in the new Google Cloud Blog platform. By analysing the source code of the application we identified a hidden vulnerable functionality that could endanger the security of the web application.
YouTube Studio Vulnerability
This article will be about two vulnerabilities that we’ve found in YouTube web application, more exactly in the Studio platform. YouTube Studio is a new dashboard created by Google for the content creators which makes their lives easier and speeds up the process of editing and publishing videos. However, we found a way of compromising every YouTube video in just a few seconds.
LinkedIn Vulnerability
LinkedIn “allows members to write, edit, and distribute articles” on its platform and anyone can do that easily, in just a few clicks. You can basically customize everything you want in your article and also you can embed resources like images, videos or slides. From all of these, the image upload feature caught our attention, as you will see below.