Second wave of Shai-Hulud npm worm compromises the global software supply chain
Are you still paying consultants to do your vulnerability scanning?
What is a cross-site scripting vulnerability?
Behind the jargon: False negatives in application security
Understanding session fixation attacks
Why DAST is the perfect fit for agile software projects
JSON Web Token attacks and vulnerabilities
Introduction to web cache poisoning
What Biden’s executive order on cybersecurity means for web application security