DEV Community

TECNO Security profile picture

TECNO Security

TECNO Security Response Center is a platform for cooperation and exchanges between TECNO and security industry experts, researchers, and organizations.

Pronouns

TECNO SRC

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read

Want to connect with TECNO Security?

Create an account to connect with TECNO Security. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
TECNO SRC Security Vulnerability Submission Function Survey

TECNO SRC Security Vulnerability Submission Function Survey

Comments
1 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
Web vulnerability bounty rules update

Web vulnerability bounty rules update

2
Comments
1 min read
【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate

【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate

Comments
1 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
[2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

2
Comments
1 min read
Hacking your first OAuth on the Web application

Hacking your first OAuth on the Web application

Comments
1 min read
TECNO Security Year-End Reward Sprint Preview: Grand Prizes Await You!

TECNO Security Year-End Reward Sprint Preview: Grand Prizes Await You!

Comments
1 min read
E-commerce website vulnerability bounty practice sharing(Ⅱ)

E-commerce website vulnerability bounty practice sharing(Ⅱ)

Comments
1 min read
E-commerce website vulnerability bounty practice sharing(I)

E-commerce website vulnerability bounty practice sharing(I)

Comments
2 min read
Story of Time Machines: Where Archived URLs and Juicy Information Handshake Each Other

Story of Time Machines: Where Archived URLs and Juicy Information Handshake Each Other

Comments
1 min read
TECNO Security Response Center 3rd Anniversary | Safeguarding Product Security, Grateful for Our Encounter

TECNO Security Response Center 3rd Anniversary | Safeguarding Product Security, Grateful for Our Encounter

Comments
1 min read
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
Share Your Favorite TECNO Security Function to win rewards!

Share Your Favorite TECNO Security Function to win rewards!

Comments
1 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
[Specially Customized] TECNO Security 3rd Anniversary Bug Hunting Competition!

[Specially Customized] TECNO Security 3rd Anniversary Bug Hunting Competition!

Comments
1 min read
Response Manipulation FTW: Understanding and Exploiting Response Manipulation

Response Manipulation FTW: Understanding and Exploiting Response Manipulation

Comments
1 min read
3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

Comments
1 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
30-day Time Limit: Swagshop Credit-Giving Activity

30-day Time Limit: Swagshop Credit-Giving Activity

Comments
1 min read
Complete Guide To Redeeming TECNO SRC Credits

Complete Guide To Redeeming TECNO SRC Credits

Comments
1 min read
Security Meetup

Security Meetup

Comments
1 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Security Hazards in the Use of startActivityForResult and setResult

Security Hazards in the Use of startActivityForResult and setResult

Comments
1 min read
TECNO Web Security Challenge Campaign starts now

TECNO Web Security Challenge Campaign starts now

2
Comments
1 min read
Comprehensive research of Android Permission Mechanisms

Comprehensive research of Android Permission Mechanisms

Comments
1 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
loading...