Resources

AppSec Blog

Web Security

Supply chain risks in AI-driven applications: Securing AI integrations and dependencies

Web Security

Okta vulnerability explained (bcrypt auth bypass)

Web Security

eBPF Vulnerabilities: Ecosystem and Security Model

Web Security

3 AppSec headaches you can cure with Predictive Risk Scoring

Web Security

Injection Attacks in App Sec: Types, tools, examples

Web Security

Layered security testing is the way—and DAST is what holds the layers together

Web Security

Ruby affected by CVE-2024-45409

Web Security

Insecure deserialization in web applications

Web Security

Linux Kernel affected by CVE-2023-2163