Today, Rashedul from Bangladesh will share an IDOR vulnerability found on the Bxxxxxxx Web App. The...
Are you a white hat who is good at finding Android phone security vulnerabilities? Submit valid...
In the previous article, (Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks, we provided a detailed...
The rapid expansion of mobile applications has brought about security risks such as data collection...
In the previous sharing, we learned about some misunderstandings and security risks related to...
In Android development, caller identity authentication is like a cat-and-mouse game between...
On March 19th, 2025, TECNO Security Response Center officially obtained authorization from the CVE...
He is from Yunnan, China, and has four years of experience in security bug mining. Over the past two...
Trusted Execution Environments (TEEs) have become an essential component in modern secure computing...
The monthly star of TECNO Security Response Center has been announced! In January, iiiiiinv from...
Phyo WaThone Win from Myanmar shared with us a guide to common Android application vulnerabilities....
To motivate and express our gratitude for the continuous support of security researchers, we now...
In penetration testing, we need to collect as much information as possible about the target. Asset...
🎯In order to make it easier for researchers to find all the activities on our platform, we have...
2025 is here, and the TECNO Security Response Center's friend referral campaign has officially...
This article primarily shares an experience in exploiting SQL injection vulnerabilities in mobile app...
🎄A survey to improve your bug reporting experience, please don't hesitate to give your...
The world of bug bounty hunting is filled with thrilling moments when some simple recon techniques...
TECNO Security Response Center respects and thanks all security researchers for their contribution to...
A thank you to all TECNO security researchers who've backed us through 2024! Here comes our festival...
Almost every application features a file upload function, from sharing documents to images. Without...
2024 is coming to an end. What new security technologies have you learned and researched this year?...
Grow in practice, and settle in the documentation. When we want to write articles about our research...
This article delves into how attackers can exploit OAuth vulnerabilities, focusing on misusing...
At the end of each year, it's time to reap the rewards. To the researchers who help us safeguard the...
Hello everyone, do you remember the content we shared last time? In the previous article, we shared a...
Today's e-commerce ecosystem is a highly interconnected and network-dependent environment, bringing...
Web crawlers, or spiders, are essential for indexing web content for search engines. However, if not...
On September 22, 2021, the TECNO Security Response Center was officially established. Security...
Insecure Direct Object References (IDOR) are a type of security flaw that happens when an application...