Rony UtevskyApplication Security Researcher> Security research grounded in real-world software engineering… [read more]
Cryptographic Payload Injection: A Novel Jailbreak Technique Against Gemini11 March 2026·10 minsSecurity Research AI Security Jailbreak Prompt Injection LLM Gemini Red Teaming
The Ghost in the Tenant: Chaining SVG UI Redressing and Persistent Authorization for Stealth Account Takeover5 February 2026·4 minsSecurity Research SVG Injection Broken Access Control Account Takeover UI Redressing Web Security
Predictable Voucher Identifier Enumeration in Cibus (Victory Integration)28 January 2026·6 minsSecurity Research Security Research Enumeration Weak Identifiers Business Logic Supply-Chain Risk Luhn Algorithm
Exploiting Layout Logic for DOM-Based XSS in react-show-more-text20 January 2026·6 minsSecurity Research React XSS Supply Chain
The Trust Fall: Bypassing a City-Wide Payment Ecosystem12 January 2026·8 minsSecurity Research Web Vulnerabilities Logic Flaws Phishing Fintech
Breaking the Paywall: How a 'Lazy' Search Implementation Compromised a Paywall23 March 2025·5 minsSecurity Research Broken Access Control Business Logic Web Security Red Teaming Brute Force
Reverse Engineering a 3D Unity Web App to Win a Chocolate Contest21 July 2024·8 minsSecurity Research Reverse Engineering Unity Game Hacking UI Automation
Dreadnode Probe 2: Reverse-Engineering a Scoring Algorithm to Extract a Hidden System Prompt12 March 2026·6 minsSecurity Research Prompt Injection AI Security Side-Channel CTF
1st Place Winner: Check Point AI Security Challenge17 December 2025·1 minAchievement AI Security Check Point CTF
Gandlaf TalentScreen AI: Bypassing AI Resume Screeners17 December 2025·3 minsPrompt Injection AI Security