The Need For Tailored Secure Code Training - Aligning with NIST Cybersecurity and Privacy Learning Program
|
|
0
|
30
|
26 September 2024
|
How to Get a Free Ticket to Black Hat Conference
|
|
0
|
114
|
20 September 2024
|
OWASP TOP 10 Secure Coding Challenges
|
|
0
|
30
|
23 August 2024
|
OWASP TOP 10 Secure Coding Challenges in Ruby
|
|
0
|
26
|
21 August 2024
|
OWASP TOP 10 Secure Coding Challenges in C#
|
|
0
|
31
|
21 August 2024
|
OWASP LLM TOP 10 AI Secure Coding Challenges
|
|
0
|
24
|
21 August 2024
|
OWASP TOP 10 Secure Coding Challenges in Java
|
|
0
|
34
|
29 July 2024
|
OWASP Top 10 Secure Coding Challenges for Go
|
|
0
|
36
|
8 July 2024
|
Implementing Secure By Patching, Secure By Design and Secure By Default
|
|
0
|
95
|
26 June 2024
|
OWASP Top 10 Secure Coding Challenges for TypeScript
|
|
0
|
71
|
23 June 2024
|
Common Pitfalls for Patching Path Traversal
|
|
0
|
99
|
29 May 2024
|
OWASP Top 10 Secure Coding Challenges for JavaScript
|
|
0
|
112
|
23 May 2024
|
OWASP Top 10 Secure Coding Challenges for Python
|
|
0
|
420
|
16 May 2024
|
Five Prompt Injection Tactics to Hack LLM Apps
|
|
0
|
415
|
13 April 2024
|
Eight Defensive Techniques to Secure LLM Apps Against Prompt Injection
|
|
0
|
576
|
13 April 2024
|
UUID Weakness - Why UUID Can Be Unsafe
|
|
0
|
479
|
2 December 2023
|
Input Validation: Necessary but Not Sufficient; It Doesn't Target the Fundamental Issue
|
|
2
|
5146
|
28 September 2023
|
Evaluating ChatGPT Effectiveness in Passing A Secure Programming Challenge
|
|
0
|
802
|
25 May 2023
|
Write up for Start Here.js: How To and Not To Prevent Integer Overflow in JavaScript
|
|
0
|
4831
|
1 December 2022
|
Write up for Start Here.java Challenge
|
|
0
|
698
|
15 November 2022
|
Technical analysis of Telco API security challenge - Three must to have API security controls
|
|
0
|
20516
|
3 November 2022
|
Avoid validation with privilege return
|
|
0
|
943
|
26 September 2022
|
A dangerous way to fix Integer Overflow in Solidity
|
|
0
|
1987
|
5 September 2022
|
🔴 Instructor-Led AppSec & DevSecOps Workshops Recordings
|
|
0
|
1207
|
7 June 2022
|
Kubernetes pod is insecure by default
|
|
0
|
529
|
10 May 2022
|
Running a process as root in a container vs running a container as root
|
|
0
|
519
|
31 March 2022
|
Intro to Smart Contract Security and reverse engineering of int overflow
|
|
0
|
558
|
26 February 2022
|
A $10,000 security bug: Identify, exploit and effectively fix SSTI
|
|
0
|
629
|
28 January 2022
|
Parser Differential: A security vulnerability that we are going to live with
|
|
0
|
426
|
19 January 2022
|
What you see is not what interpreter sees!
|
|
0
|
417
|
6 December 2021
|