Syndicated Blog

ShiftLeft Blog – Medium
ShiftLeft is the first cloud security solution specific to each version of each application, not to threats – Medium
Understanding JVM soft references for great good (and building a cache)

Understanding JVM soft references for great good (and building a cache)

Java (the island) landscapeThere are plenty of good and popular caching libraries on the JVM, including ehcache, guava and many others. However in some situations it’s worth exploring other options. Maybe you ...
How to Hunt Vulnerabilities in Your Code Using ShiftLeft Ocular: Denial of Service (DOS) Attack

Detect business logic vulnerabilities during development with ShiftLeft Ocular

ShiftLeft Ocular is the only vulnerability analysis solution that can detect business logic vulnerabilities during development time, reducing the attack surface before production. It is free to download with a 14 day ...
Vulnerability Dashboard : Measure your progress to deliver secure apps

Vulnerability Dashboard : Measure your progress to deliver secure apps

Vulnerability Dashboard: Measure security quality of your releases over timeShiftleft is introducing a new Vulnerability Dashboard — A singular view of application security quality metrics including a list of vulnerabilities based on static/runtime analysis ...
ShiftLeft Raises $20 Million in Series B Funding

ShiftLeft Raises $20 Million in Series B Funding

Today we are thrilled to announce a new $20M round of Series B funding. Thomvest Ventures led the round and was joined by new investor SineWave Ventures. Our existing investors, Bain Capital ...
ShiftLeft is 2019 RSA Innovation Sandbox Finalist!

ShiftLeft is 2019 RSA Innovation Sandbox Finalist!

What a way to start 2019!Our groundbreaking innovation, ShiftLeft Ocular, has been nominated as a top ten finalist of the prestigious Innovation Sandbox Contest that’s run annually at the RSA Conference.It is ...
How-to Identify Directory Traversal Vulnerabilities with ShiftLeft Ocular: A Detailed Code Example

How-to Identify Directory Traversal Vulnerabilities with ShiftLeft Ocular: A Detailed Code Example

How-to Identify Directory Traversal Vulnerabilities with ShiftLeft Ocular: A Detailed Code Example with DeepLearning4j and OpenRefine (CVE-2018–19859)In one of our most recent blog posts Chetan Conikee wrote about a directory traversal caused ...
Deconstructing Data Leak incident of Signet Jewelers (parent company of Kay and Jared jewelers)

Deconstructing Data Leak incident of Signet Jewelers (parent company of Kay and Jared jewelers)

Protecting the Crown Jewels: Deconstructing Data Leakage in Exotic Environments (Inspiration from Signet — Kay/Jared Jewelers Breach)Credits : Micheal HillNote : The following series of deconstruction/post-mortem is indicative of the security issues similar to ...
Time Series at ShiftLeft

Time Series at ShiftLeft

Time series are a major component of the ShiftLeft runtime experience. This is true for many other products and organizations too, but each case involves different characteristics and requirements. This post describes ...
Directory traversal (dubbed ZipSlip) vulnerability discovered in DeepLearning4j (ArchiveUtils)…

Directory traversal (dubbed ZipSlip) vulnerability discovered in DeepLearning4j (ArchiveUtils)…

Directory traversal (dubbed ZipSlip) vulnerability discovered in DeepLearning4j (ArchiveUtils) libraryRecently, we’ve identified a number of our customers who are susceptible to a Directory traversal vulnerability. The exploit chain (circumstances to exploit the ...
ShiftLeft for .Net

ShiftLeft for .Net

Today we’re announcing the general availability of our continuous application security service for the .Net Framework (.Net). .Net developers can now leverage the highest ever benchmarked source code analysis [1] to automatically ...
Loading...