Security Vulnerabilities
HTTP Request Smuggling: A Primer
One of the security issues you might face with your website or web app is request smuggling.HTTP request smuggling is a security vulnerability that allows an attacker to interfere with the way ...
Why “Shift Left” in DevOps is really “Shift Center”
In an industry full of acronyms and buzz words, the term “shift left” surfaced as a result of organizations waiting to perform software security testing until the end of the development process ...
Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
The world as a whole is coming together to quell the spread of COVID-19 by limiting social interaction, and in some instances, initiating full quarantines. Schools are closed for weeks, if not ...
Why You Need a Software Bill of Materials More Than Ever
Imagine that a new vulnerability in lodash was just announced. Applications using the npm package are being exploited through large scale automated DoS attacks. You need to act quickly to understand if ...
Training Exposure: Addressing Secure Coding Education in Your Software Security Program
According to the Verizon 2019 Data Breach Investigation Report, 69 percent of the data breaches investigated by Verizon were perpetrated by outsiders, 63 percent were the result of attackers targeting server assets, ...
LeapFrog LeapPad Ultimate Security Vulnerabilities
Protecting our children from the dangers on the internet is something all parents strive for and struggle with. When you find a toy that you think is safe, and will educate and ...
Adoption Exposure: Your Software Security Needs Integration and Automation
There are many software security solutions available today designed to provide insight into important security issues found during software development. As organizations begin moving forward with DevOps initiatives, are their current Application ...
Houston [I mean Bulgaria], we’ve got a problem
Every relationship is built on trust. Trust is at the core of every lasting relationship, whether it’s between family members, between spouses, between organizations and their customers, and even between citizens and ...
Code Exposure: The Vulnerabilities in Your Code & Where They Originate
Code Exposure: The Vulnerabilities in Your Code & Where They Originate Typical software applications are comprised of two types of code: custom code created by your internal development teams, and third-party code ...
A New EU Cybersecurity Regulation and Why It’s Important
On the heels of GDPR and what it meant to the rest of the world outside of the EU, another EU cybersecurity regulation is on the horizon. Most organizations remember the effort ...

