Rony UtevskyApplication Security Researcher> Security research grounded in real-world software engineering… [read more]
Predictable Voucher Identifier Enumeration in Cibus (Victory Integration)25 January 2026·6 minsSecurity Research Security Research Enumeration Weak Identifiers Business Logic Supply-Chain Risk Luhn Algorithm
Exploiting Layout Logic for DOM-Based XSS in react-show-more-text20 January 2026·6 minsSecurity Research Zero-Day React XSS Supply Chain
The Trust Fall: Bypassing a City-Wide Payment Ecosystem12 January 2026·8 minsSecurity Research Web Vulnerabilities Logic Flaws Phishing Fintech
How an Unpatched Zero-Day in a React Library Exposed Corporate Data, Employee Credentials, and Financial Assets28 December 2025·10 minsSecurity Research XSS Supply Chain Zero-Day Credential Harvesting Red Teaming
Exposing Top Secret IDF Documents: The Danger of Improper Digital Redaction5 November 2025·2 minsSecurity Research Data Leak Redaction Failure IDF Responsible Disclosure Information Security
Breaking the Paywall: How a 'Lazy' Search Implementation Compromised a Paywall23 March 2025·5 minsSecurity Research Broken Access Control Business Logic Web Security Red Teaming Brute Force
Reverse Engineering a 3D Unity Web App to Win a Chocolate Contest21 July 2024·7 minsSecurity Research Reverse Engineering Unity Game Hacking UI Automation
1st Place Winner: Check Point AI Security Challenge17 December 2025·1 minAchievement AI Security Check Point
Gandlaf TalentScreen AI: Bypassing AI Resume Screeners17 December 2025·3 minsPrompt Injection AI Security