Supply chain risks in AI-driven applications: Securing AI integrations and dependencies
Understanding web vulnerability scanners
Broken access control: The leading OWASP Top 10 security risk
Vulnerable and outdated components: An OWASP Top 10 threat
Top 10 dynamic application security testing (DAST) tools for 2026
GH Actions changed-files supply chain attack: What happened?
Vulnerable test sites to test your XSS skills: Hands-on AppSec
Components of dynamic application security testing
Types of information disclosure vulnerabilities