Blog

AppSec Blog

Web Security

Invicti DAST-to-SAST correlation: Fix verified runtime risks at pipeline speed

Web Security

MOVEit Transfer breaches are a perfect storm of application security risks

Web Security

Invicti Insights: Women in engineering changing the game

Web Security

What’s missing from the OWASP API Security Top 10 2023

Web Security

Why penetration testing tools don’t work as enterprise scanners

Web Security

SQL injection vulnerability in MOVEit Transfer leads to data breaches worldwide

Web Security

New guidelines from NIST stress the need for accurate vulnerability assessment and disclosure

Web Security

How APIs creep up on you – and how to stay secure regardless

Web Security

SSDLC vs SDLC vs SDL: Security Development Lifecycle Explained