How To Check for JID Attacks With Java

A consistent inclusion in the OWASP top 10, insecure deserialization is a subtle but dangerous application security threat. This aptly named attack exploits data serialization, the “bread and butter” data transformation process that takes place when an object is passed from one web application to another. Under normal circumstances, when a new object is sent … Read more