Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·20 hours agoAppSec Newsletter 0010Links [artigo + video] Technical Introduction to Software Bill of Materials (SBOMs) [artigo] 5 Best Practices for Securing Your API Gateway [tool] OWASP Risk Rating Calculator [tool] dockle - Container Image Linter for Security, Helping build the...Discussappsec
Panagiotis Vasilikossecuringbits.com·Sep 27, 2023Finding Credentials in A Dev's MachineDiscovering credentials on a developer's machine is like stumbling upon a goldmine 🧈. Here are eight crucial locations on a Unix-type machine where credentials can be found 👇.Discuss·34 reads#cybersecurity
Panagiotis Vasilikossecuringbits.com·Sep 20, 2023GitHub RepoJackingHave you heard of GitHub RepoJacking? 💀 Ilay Goldman (@goldmanilay) and Yakir Kadkoda (@YakirKad) from the Aqua Security Team have discovered 37k vulnerable repositories that are at risk of RepoJacking, posing a significant threat to organizations.Discuss·37 readsApplication Security
CyberFreak999cyberfreak.hashnode.dev·Sep 18, 2023Governance, Risk and Compliance: The non-technical side of CybersecurityCybersecurity is often dominated by sophisticated hacks, advanced technology, and complex coding. A fundamental aspect, however, operates largely in the shadows -- Governance, Risk, and Compliance (GRC). Governance, Risk, and Compliance (GRC) is a wa...Discuss·44 readsCybersecuritycybersecurity
Panagiotis Vasilikossecuringbits.com·Sep 13, 2023Web Cache Deception AttackHave you heard of the Web Cache Deception Attack? 💀 This technique involves malicious actors exploiting caching mechanisms to deceive the cache system, which can result in unauthorized access or data manipulation.Discussbugbounty
Panagiotis Vasilikossecuringbits.com·Sep 6, 2023HTTP Response Headers: Usage and Security AbuseHTTP Response Headers: Usage 🛠 and Security Abuse ☠. Those complement the HTTP Request Headers we saw last week :)Discusswebsecurity
Prajoti Raneprajotirane.hashnode.dev·Sep 1, 2023Combating Application Security Risks: A Thorough Overview to Application SecurityIn today's increasingly digital environment, apps are organizations' lifeblood. Everything from client interactions to internal operations is powered by them. However, enterprises have been exposed to a wide range of security dangers as a result of t...Discuss·1 likeApplication Security
Panagiotis Vasilikossecuringbits.com·Aug 30, 2023HTTP Request Headers: Usage and Security AbuseDiscussbugbounty
muhammad zubairmuhammadzubair.hashnode.dev·Aug 21, 2023🔒📚 Mastering DevSecOps: A Comprehensive Guide🌟 Welcome to our comprehensive guide on DevSecOps! In this blog, we'll delve into the key chapters of the course, breaking down the essential concepts and practices that form the foundation of DevSecOps. Let's dive right in and explore the fascinati...DiscussDevSecOps
Panagiotis Vasilikossecuringbits.com·Aug 16, 2023Authentication Architecture Patterns for MicroservicesAuthentication (AuthN) architecture patterns for microservices👇DiscussMicroservices