During a pentest engagement we found a Java application vulnerable to unsafe reflection [1]. This application allowed us to instantiate an…
Welcome to the world of Web Application and API Protection (WAAP), an advanced security approach that is revolutionizing the protection of…
As artificial intelligence (AI) becomes more and more present in our daily lives, it has become crucial to consider the potential risks and…
Nowadays a very common practice is to integrate security scans during the continuous integration and continuous delivery (CI/CD) phase of…
IoT (Internet of Things) devices are increasingly present in our daily lives, from smartwatches to industrial control systems. However, as…
Have you ever found yourself spending hours trying to figure out why your new installation of a database, web server, or Python library…
If you are a developer or work with software development, you may have wondered about the importance of documentation in your daily…
In this article, we will approach threat modeling according to the Software Security Maturity Model, also known by the acronym SAMM. It is…
Software has been dominating the corporate universe, and it is often a differential in an increasingly competitive world. Therefore…