Abhiramcloudbuddy.hashnode.dev·Oct 29, 2024Supply Chain Attacks: Securing Your Software from Third-Party CodeIn today's interconnected world, software applications increasingly rely on third-party components. While these components can accelerate development and provide valuable functionality, they also introduce new security risks. Supply chain attacks, wh...supplychainsecurity
Abhiramcloudbuddy.hashnode.dev·Oct 25, 2024Software Composition Analysis (SCA): Identifying Open Source Vulnerabilities in Your CodeIn today's software development landscape, open-source components have become an integral part of building applications. While open-source libraries and frameworks offer numerous benefits, they also introduce new security risks. Software Composition ...shiftlefttesting
Germain Oleablog.germain.tech·Oct 14, 2024Comment Exploiter le Shift-Left pour Optimiser la Sécurité Applicative et Renforcer votre Politique de SécuritéIntroduction Dans un monde où la nuisance à la sécurité de l’information évolue à un rythme effréné, la sécurité applicative devient pour moi une priorité incontournable pour les entreprises souhaitant protéger leurs données et leurs systèmes d’infor...32 readsshiftleft
Trix Cyruswaymap-web-vulnerability-scanner.hashnode.dev·Sep 29, 2024Waymap - Web Application Vulnerability Scanner ToolWaymap - Web Vulnerability Scanner Tool url - https://github.com/TrixSec/waymap Current Version: 1.1.1 Author: Trix Cyrus What is Waymap? Waymap is a fast and optimized web vulnerability scanner designed for penetration testers. It effectively identi...1 likehacking
Subhanshu Mohan Guptablogs.subhanshumg.com·Sep 23, 2024Enhancing Linux DevSecOps with AI for Vulnerability Management and ComplianceWelcome to the second part of my Linux series, where we take a deep dive into AI-powered vulnerability management and compliance auditing. In the previous installment, we explored the fundamentals of securing Linux environments, but now it's time to ...10 likes·33 readsAI powered DevOpscloud security
Ishikha raoishikarao.hashnode.dev·Aug 29, 2024Patch Management vs. Vulnerability Management: Key DifferencesIn the cybersecurity realm, icing the safety of projects and data is essential. The two most essential processes in this domain are- patch management and vulnerability management. While both aim to reduce and eventually remove security risks, they se...Patch management
Ujjwal Jhaujjwaljha.hashnode.dev·Aug 22, 2024Introducing deps.dev API: Google's API to identify vulnerabilities effectivelyIn our fast-paced software development landscape, ensuring security is always at the forefront of our minds. As developers, we understand the importance of identifying and mitigating vulnerabilities within our codebase to build resilient and secure a...APIs
Subhanshu Mohan Guptablogs.subhanshumg.com·Aug 20, 2024AI-Powered Ethical Hacking: Automating Penetration Testing in DevSecOpsIntroduction As cyber threats evolve in complexity, the need for robust security practices has never been more critical. Traditional penetration testing, while effective, is often time-consuming and requires skilled professionals. Enter AI-powered au...40 likes·57 readsAI powered DevOpsDevSecOps
Keshav Agrawalsecopsbyte.com·Aug 15, 2024Weekly CVE AdvisoryAs we navigate through the evolving landscape of cybersecurity threats, this week's advisory highlights four critical CVE and a notable research finding from recent security updates. This information aims to help organizations prioritize their patchi...27 readsWeekly CVE Advisorylatest vulnerability
Abhiramcloudbuddy.hashnode.dev·Aug 10, 2024Vulnerability Management for the Cloud: Securing Your Cloud InfrastructureThe cloud has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, with these benefits come unique security challenges. One of the most critical aspects of cloud security is vulnerability managem...Vulnerability management