Second wave of Shai-Hulud npm worm compromises the global software supply chain
Building DevSecOps when you’re stuck in waterfall development
Incident Response Steps in Web Application Security
Why You Need DAST in Your SDLC: Announcing the Invicti White Paper
Microsoft Exchange Server Attacks: What You Need To Know
Understanding Cookie Poisoning Attacks
The Defender’s Dilemma: 5 Tips for Keeping Your Web Applications Secure
Security Misconfigurations: The Soft Underbelly of Web Applications
5 Steps to Improving Your Cybersecurity Posture