unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
The Global Codebashing AppSec Training Initiative by Checkmarx and OWASP
Professionals in any profession need to train. The more training you do, the better you’ll get....
2024-4-18 19:0:0 | 阅读: 4 |
收藏
|
Checkmarx.com - checkmarx.com
appsec
checkmarx
software
codebashing
What you should know: HTTP/2 CONTINUATION Flood Vulnerability
A new class of vulnerabilities in specific implementations of the HTTP/2 protocol, dubbed "HTTP...
2024-4-10 21:22:2 | 阅读: 13 |
收藏
|
Checkmarx.com - checkmarx.com
affects
flood
frames
New Technique to Trick Developers Detected in an Open Source Supply Chain Attack
In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub's sear...
2024-4-10 19:0:0 | 阅读: 13 |
收藏
|
Checkmarx.com - checkmarx.com
malicious
hxxps
attackers
github
Everything You Need to Know about Enterprise Application Security
Any organization that develops and/or deploys software applications must have application s...
2024-4-7 15:33:2 | 阅读: 4 |
收藏
|
Checkmarx.com - checkmarx.com
security
appsec
sdlc
processes
checkmarx
Checkmarx One Total Economic Impact Study Finds Return on Investment of 177% in Fewer Than Six Months and Gain of $7.13M in Benefits Over Three Years
New independent study of a global, $10 billion composite organization with 1000 developersdemon...
2024-4-4 19:0:31 | 阅读: 3 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
security
appsec
developers
What Is IaC Security, and How Does It Work?
Infrastructure-as-Code, or IaC, is a great way to add speed and efficiency to the complex w...
2024-4-4 17:30:12 | 阅读: 4 |
收藏
|
Checkmarx.com - checkmarx.com
iac
security
approaches
buckets
What is Cloud-native Application Security, and How Does It Work?
Cloud-native applications are different in manyways from traditional apps. Cloud-native app...
2024-4-4 17:9:51 | 阅读: 6 |
收藏
|
Checkmarx.com - checkmarx.com
cloud
security
development
software
Code to Cloud Security: Best Practices
Code to Cloud Security is a security approach that turns security into an integral part of...
2024-4-4 16:59:23 | 阅读: 6 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
development
appsec
What Is DAST? Dynamic Application Security Testing Explained
Most security testing strategies begin with scanning application source code or binaries before...
2024-4-4 16:53:14 | 阅读: 3 |
收藏
|
Checkmarx.com - checkmarx.com
dast
security
software
checkmarx
6 Types of SCA Tools to Help Improve Security
Now that we’ve covered the essentials of what SCA does and how to use it, let’s discuss the cru...
2024-4-2 22:11:35 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
developers
library
security
software
Backdoor Discovered in xz: The Most Advanced Supply Chain Attack Known to Date
By...
2024-4-1 20:24:35 | 阅读: 3 |
收藏
|
Checkmarx.com - checkmarx.com
xz
software
security
jia
tan
PyPi Is Under Attack: Project Creation and User Registration Suspended
By...
2024-3-28 19:31:30 | 阅读: 21 |
收藏
|
Checkmarx.com - checkmarx.com
2024remove
projectpy
projectbip
malicious
software
Checkmarx Announces Partnership with Wiz: Advancing AppSec through Code-to-Cloud Integration
Checkmarx One enterprise AppSec platform now correlates cloud insights from Wiz to deliveractio...
2024-3-26 21:0:23 | 阅读: 11 |
收藏
|
Checkmarx.com - checkmarx.com
cloud
checkmarx
security
wiz
appsec
Checkmarx + Wiz: Advancing AppSec with Code to Cloud Integration
By...
2024-3-26 20:45:0 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
cloud
wiz
Over 170K Users Affected by Attack Using Fake Python Infrastructure
The Checkmarx Research team recently discovered an attack campaign targeting the software suppl...
2024-3-25 19:0:0 | 阅读: 25 |
收藏
|
Checkmarx.com - checkmarx.com
malicious
attacker
python
github
colorama
SDLC: The Ultimate Guide to Software Development Lifecycle
ByEdit...
2024-3-21 15:54:19 | 阅读: 2 |
收藏
|
Checkmarx.com - checkmarx.com
sdlc
security
development
software
processes
SDLC: The Ultimate Guide to Software Development Lifecycle
By...
2024-3-21 15:54:19 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
sdlc
security
development
software
processes
What is SCA (Software Composition Analysis) and how does it work
Modern applications commonly include not just original source code written by the developers wh...
2024-3-20 17:40:18 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
software
licensing
analysis
What is SCA (Software Composition Analysis) and how does it work
Modern applications commonly include not just original source code written by the developers wh...
2024-3-20 17:40:18 | 阅读: 1 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
software
composition
licensing
What is Common Vulnerability Scoring System (CVSS)
Every security vulnerability is unique. Different vulnerabilities impact different systems, inv...
2024-3-19 00:19:40 | 阅读: 11 |
收藏
|
Checkmarx.com - checkmarx.com
scores
scoring
network
checkmarx
Previous
6
7
8
9
10
11
12
13
Next