TECNO Security

TECNO Security @tecno-security

About: TECNO Security Response Center is a platform for cooperation and exchanges between TECNO and security industry experts, researchers, and organizations.

Joined:
Mar 26, 2024

TECNO Security
articles - 48 total

Security Vulnerability in Hidden Parameters: IDOR Attack on Mighty App Payment Page

Today, Rashedul from Bangladesh will share an IDOR vulnerability found on the Bxxxxxxx Web App. The...

Learn More 0 0May 9

[Vulnerability Campaign] Protect TECNO devices

Are you a white hat who is good at finding Android phone security vulnerabilities? Submit valid...

Learn More 0 0Apr 21

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

In the previous article, (Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks, we provided a detailed...

Learn More 0 0Apr 11

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

The rapid expansion of mobile applications has brought about security risks such as data collection...

Learn More 0 0Apr 10

(Ⅱ) Android Identity Authentication

In the previous sharing, we learned about some misunderstandings and security risks related to...

Learn More 0 0Mar 26

(Ⅰ) Android Identity Authentication: A Game of Cat and Mouse between Developers and "Hackers"

In Android development, caller identity authentication is like a cat-and-mouse game between...

Learn More 0 0Mar 24

CVE Exclusive Activity

On March 19th, 2025, TECNO Security Response Center officially obtained authorization from the CVE...

Learn More 0 0Mar 19

[Best of February - M3Di] From Forest to Code: Transformational Security Researcher Growth Notes

He is from Yunnan, China, and has four years of experience in security bug mining. Over the past two...

Learn More 0 0Mar 17

Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Trusted Execution Environments (TEEs) have become an essential component in modern secure computing...

Learn More 0 0Mar 10

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

The monthly star of TECNO Security Response Center has been announced! In January, iiiiiinv from...

Learn More 0 0Feb 21

Beginner’s Guide: Basic Methods for Finding Android Application Vulnerabilities

Phyo WaThone Win from Myanmar shared with us a guide to common Android application vulnerabilities....

Learn More 0 0Feb 19

"Hacker of the Month" - Find Excellence

To motivate and express our gratitude for the continuous support of security researchers, we now...

Learn More 0 0Feb 11

Automated Penetration Testing: A Guide to Domain Collection

In penetration testing, we need to collect as much information as possible about the target. Asset...

Learn More 0 0Jan 7

【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities

🎯In order to make it easier for researchers to find all the activities on our platform, we have...

Learn More 0 0Jan 2

Guidelines about the Refer-a-Friend Program

2025 is here, and the TECNO Security Response Center's friend referral campaign has officially...

Learn More 0 0Jan 1

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

This article primarily shares an experience in exploiting SQL injection vulnerabilities in mobile app...

Learn More 0 0Dec 18 '24

TECNO SRC Security Vulnerability Submission Function Survey

🎄A survey to improve your bug reporting experience, please don't hesitate to give your...

Learn More 0 0Dec 12 '24

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

The world of bug bounty hunting is filled with thrilling moments when some simple recon techniques...

Learn More 0 0Dec 11 '24

Web vulnerability bounty rules update

TECNO Security Response Center respects and thanks all security researchers for their contribution to...

Learn More 2 0Nov 20 '24

【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate

A thank you to all TECNO security researchers who've backed us through 2024! Here comes our festival...

Learn More 0 0Nov 19 '24

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Almost every application features a file upload function, from sharing documents to images. Without...

Learn More 0 0Nov 14 '24

[2024 Thanksgiving] Security Technology Research Writing Activity

2024 is coming to an end. What new security technologies have you learned and researched this year?...

Learn More 0 0Nov 11 '24

Guide to Writing Security Technology Blog Articles

Grow in practice, and settle in the documentation. When we want to write articles about our research...

Learn More 2 0Nov 6 '24

Hacking your first OAuth on the Web application

This article delves into how attackers can exploit OAuth vulnerabilities, focusing on misusing...

Learn More 0 0Oct 30 '24

TECNO Security Year-End Reward Sprint Preview: Grand Prizes Await You!

At the end of each year, it's time to reap the rewards. To the researchers who help us safeguard the...

Learn More 0 0Oct 25 '24

E-commerce website vulnerability bounty practice sharing(Ⅱ)

Hello everyone, do you remember the content we shared last time? In the previous article, we shared a...

Learn More 0 0Oct 17 '24

E-commerce website vulnerability bounty practice sharing(I)

Today's e-commerce ecosystem is a highly interconnected and network-dependent environment, bringing...

Learn More 0 0Oct 9 '24

Story of Time Machines: Where Archived URLs and Juicy Information Handshake Each Other

Web crawlers, or spiders, are essential for indexing web content for search engines. However, if not...

Learn More 0 0Sep 26 '24

TECNO Security Response Center 3rd Anniversary | Safeguarding Product Security, Grateful for Our Encounter

On September 22, 2021, the TECNO Security Response Center was officially established. Security...

Learn More 0 0Sep 22 '24

Insecure Direct Object Reference (IDOR)

Insecure Direct Object References (IDOR) are a type of security flaw that happens when an application...

Learn More 0 0Sep 12 '24