The Need For Tailored Secure Code Training - Aligning with NIST Cybersecurity and Privacy Learning Program
|
|
0
|
16
|
26 2024
|
How to Get a Free Ticket to Black Hat Conference
|
|
0
|
17
|
20 2024
|
OWASP TOP 10 Secure Coding Challenges
|
|
0
|
17
|
23 2024
|
OWASP TOP 10 Secure Coding Challenges in Ruby
|
|
0
|
21
|
21 2024
|
OWASP TOP 10 Secure Coding Challenges in C#
|
|
0
|
23
|
21 2024
|
OWASP LLM TOP 10 AI Secure Coding Challenges
|
|
0
|
8
|
21 2024
|
OWASP TOP 10 Secure Coding Challenges in Java
|
|
0
|
17
|
29 2024
|
OWASP Top 10 Secure Coding Challenges for Go
|
|
0
|
23
|
8 2024
|
Implementing Secure By Patching, Secure By Design and Secure By Default
|
|
0
|
93
|
26 2024
|
OWASP Top 10 Secure Coding Challenges for TypeScript
|
|
0
|
48
|
23 2024
|
Common Pitfalls for Patching Path Traversal
|
|
0
|
98
|
29 2024
|
OWASP Top 10 Secure Coding Challenges for JavaScript
|
|
0
|
86
|
23 2024
|
OWASP Top 10 Secure Coding Challenges for Python
|
|
0
|
392
|
16 2024
|
Five Prompt Injection Tactics to Hack LLM Apps
|
|
0
|
378
|
13 2024
|
Eight Defensive Techniques to Secure LLM Apps Against Prompt Injection
|
|
0
|
519
|
13 2024
|
UUID Weakness - Why UUID Can Be Unsafe
|
|
0
|
460
|
2 2023
|
Input Validation: Necessary but Not Sufficient; It Doesn't Target the Fundamental Issue
|
|
2
|
5105
|
28 2023
|
Evaluating ChatGPT Effectiveness in Passing A Secure Programming Challenge
|
|
0
|
802
|
25 2023
|
Write up for Start Here.js: How To and Not To Prevent Integer Overflow in JavaScript
|
|
0
|
4819
|
1 2022
|
Write up for Start Here.java Challenge
|
|
0
|
690
|
15 2022
|
Technical analysis of Optus API security challenge - Three must to have API security controls
|
|
0
|
20377
|
3 2022
|
Avoid validation with privilege return
|
|
0
|
943
|
26 2022
|
A dangerous way to fix Integer Overflow in Solidity
|
|
0
|
1986
|
5 2022
|
🔴 Instructor-Led AppSec & DevSecOps Workshops Recordings
|
|
0
|
1205
|
7 2022
|
Kubernetes pod is insecure by default
|
|
0
|
528
|
10 2022
|
Running a process as root in a container vs running a container as root
|
|
0
|
519
|
31 2022
|
Intro to Smart Contract Security and reverse engineering of int overflow
|
|
0
|
558
|
26 2022
|
A $10,000 security bug: Identify, exploit and effectively fix SSTI
|
|
0
|
628
|
28 January 2022
|
Parser Differential: A security vulnerability that we are going to live with
|
|
0
|
425
|
19 January 2022
|
What you see is not what interpreter sees!
|
|
0
|
417
|
6 2021
|