Resources

Web Security

Web Security

Second wave of Shai-Hulud npm worm compromises the global software supply chain

Web Security

Are you still paying consultants to do your vulnerability scanning?

Web Security

What is a cross-site scripting vulnerability?

Web Security

Behind the jargon: False negatives in application security

Web Security

Understanding session fixation attacks

Web Security

Why DAST is the perfect fit for agile software projects

Web Security

JSON Web Token attacks and vulnerabilities

Web Security

Introduction to web cache poisoning

Web Security

What Biden’s executive order on cybersecurity means for web application security