Include Security's Avatar

Include Security

@includesecurity.bsky.social

https://includesecurity.com/

10 Followers  |  0 Following  |  7 Posts  |  Joined: 12.03.2025  |  1.123

Latest posts by includesecurity.bsky.social on Bluesky

Preview
Immutable Strings in Java - Are Your Secrets Still Safe? - Include Security Research Blog Java programmers might not be aware their secrets could be floating around in system memory long after it's assumed those secrets have been removed. The problem is a combination of immutability and ga...

Our recent post explores the unpredictability of Java garbage collection and the implications that has for secrets in code.

blog.includesecurity.com/2025/11/immu...

11.11.2025 19:16 — 👍 0    🔁 0    💬 0    📌 0
Preview
Production Security, Not That Kind - Include Security Research Blog The Include Security team takes a foray into the world of audio production equipment in our latest blog post. We look under the hood of a professional-grade audio mixer to explore its security profile...

In our latest post we look under the hood of a professional-grade audio mixer to explore its security profile and consider how vulnerabilities could be leveraged by an attacker in a real world setting.

blog.includesecurity.com/2025/10/prod...

03.10.2025 19:50 — 👍 0    🔁 0    💬 0    📌 0
Preview
LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matter...

Developers should consider how implementing LLMs into an application affects its attack surface. Likewise, pentesters assessing those applications should scope the test with that attack surface in mind. Our latest post covers both perspectives!

blog.includesecurity.com/2025/07/llms...

17.07.2025 19:12 — 👍 1    🔁 0    💬 0    📌 0
Preview
Misinterpreted: What Penetration Test Reports Actually Mean - Include Security Research Blog This month's post discusses pentest reports and how the various audiences that consume them sometimes misinterpret what they mean. We cover why findings in a report are not a sign of failure, why "cle...

Our most recent post covers various ways pentest reports are misinterpreted, including why findings aren't a sign of failure and why "clean" reports may not indicate a good security posture.

blog.includesecurity.com/2025/05/misi...

28.05.2025 18:43 — 👍 2    🔁 0    💬 0    📌 0
Preview
Cross-Site WebSocket Hijacking Exploitation in 2025 - Include Security Research Blog Include Security's latest blog post covers Cross-Site WebSocket Hijacking and how modern browser security features do (or don't) protect users. We discuss Total Cookie Protection in Firefox, Private N...

Do you use WebSockets? Read our latest blog post to find out how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking.

blog.includesecurity.com/2025/04/cros...

17.04.2025 19:59 — 👍 1    🔁 2    💬 1    📌 0
Key Review Portal

Today our team at IncludeSec is releasing a small website to help those concerned with key collisions. This easy site allows you to check if your private keys have been found to be public!

ismyprivatekeypublic.com

Please pass along to your industry colleagues who might need such a site today 💓 🦾

01.04.2025 18:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
Memory Corruption in Delphi - Include Security Research Blog In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" la...

Hi all, check out our latest blog post on Delphi memory corruption vulnerabilities!

blog.includesecurity.com/2025/03/memo...

We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples.

13.03.2025 20:34 — 👍 1    🔁 1    💬 1    📌 0