Secure Development of Payment Applicationsapplications for security vulnerabilities and configuration issues. Next, we cover our implementation of a proof-of-concept attack chain that demonstrates the capabilities an attacker could leverage in a vulnerable scenario. Finally, we discuss the process of vulnerability discovery, development of attacker capabilities, as well as defensive countermeasures.
Subscribe for Our Updates
Please enter your email address and receive the latest updates.