Predictable Voucher Identifier Enumeration in Cibus (Victory Integration)25 January 2026·6 minsSecurity Research Security Research Enumeration Weak Identifiers Business Logic Supply-Chain Risk Luhn Algorithm
Breaking the Paywall: How a 'Lazy' Search Implementation Compromised a Paywall23 March 2025·5 minsSecurity Research Broken Access Control Business Logic Web Security Red Teaming Brute Force
The 1-Shekel Ticket: Broken Access Control, Mass PII Exposure, and Price Manipulation in a Concert Ticketing Platform17 September 2024·4 minsSecurity Research IDOR Broken Access Control Business Logic PII Exposure Web Security