Nikola DinevskiforCodeChemblog.codechem.com·Dec 10, 2024A Deep Dive into OpenVAS: Enhancing Network Security Through Vulnerability ScanningHeads up: Some of the vulnerabilities found in the reports were created for the explicit purpose of testing the accuracy and reliability of OpenVAS as a tool and platform. TL;DR:This blog post explores the implementation of OpenVAS (Open Vulnerabilit...22 likes·121 reads#openvas
Abhiramcloudbuddy.hashnode.dev·Oct 29, 2024Supply Chain Attacks: Securing Your Software from Third-Party CodeIn today's interconnected world, software applications increasingly rely on third-party components. While these components can accelerate development and provide valuable functionality, they also introduce new security risks. Supply chain attacks, wh...supplychainsecurity
Krzysztof Kałamarskikkalamarski.me·Oct 17, 2024Automate Your Web Security: Mastering Authenticated ZAP Scans with the ZAP Automation FrameworkAs developers, we strive to deliver secure systems to our clients. However, with large applications and hundreds of potential vulnerabilities and attacks, performing manual security testing for each new release can be a daunting task. Fortunately, th...32 readszap
Tanishka Marrottcloud-design-diaries.hashnode.dev·Oct 13, 2024Mastering Container Security (Real-Practical Steps for Building Safer, Resilient Workloads)Containerized environments have taken over modern infrastructure, but with great convenience comes even greater security risks. Let’s face it, securing containers isn’t optional—it’s mandatory. And if you’re still deploying containers without giving ...2 likessecure docker file
Abhiramcloudbuddy.hashnode.dev·Aug 10, 2024Vulnerability Management for the Cloud: Securing Your Cloud InfrastructureThe cloud has revolutionized the way businesses operate, offering scalability, flexibility, and cost-efficiency. However, with these benefits come unique security challenges. One of the most critical aspects of cloud security is vulnerability managem...Vulnerability management
Abhiramcloudbuddy.hashnode.dev·Jul 26, 2024The Future of Vulnerability ManagementThe cybersecurity landscape is constantly evolving, with new threats emerging daily. Traditional vulnerability management practices, while essential, are often struggling to keep pace with the rapid changes in technology and the sophistication of cyb...Vulnerability management
Cloud Tunedcloudtuned.hashnode.dev·Jun 28, 2024Exploring Detectify: Advancing Web Application SecurityExploring Detectify: Advancing Web Application Security Introduction As web applications continue to evolve and become more complex, ensuring their security has become a top priority for organizations. Detectify is a leading web application security ...Detectify
Cloud Tunedcloudtuned.hashnode.dev·Jun 27, 2024Exploring AuditJS: Enhancing JavaScript Dependency SecurityExploring AuditJS: Enhancing JavaScript Dependency Security Introduction As modern web applications rely heavily on third-party dependencies, ensuring the security of these dependencies has become a critical concern for developers. AuditJS is a power...audit-js
Cloud Tunedcloudtuned.hashnode.dev·Jun 26, 2024Unveiling Snyk: Simplifying Open Source SecurityUnveiling Snyk: Simplifying Open Source Security Introduction With the widespread adoption of open-source software, managing dependencies and ensuring their security has become a critical aspect of modern software development. Snyk is a comprehensive...snyk
Cloud Tunedcloudtuned.hashnode.dev·Jun 25, 2024Exploring Brakeman: Enhancing Ruby on Rails SecurityExploring Brakeman: Enhancing Ruby on Rails Security Introduction Ruby on Rails is a popular web application framework known for its productivity and ease of development. However, like any web framework, Ruby on Rails applications are susceptible to ...breakman