Close
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo
One Time Scan
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo
One Time Scan

Offensive 360 Blog

All in one Source Code Analysis, Malware Analysis, Dependency Analysis, License Checks and Infra as Code

 

OpenSSL Vulnerabilities: Critical or Not?

The OpenSSL Project announced on October 25 2022 that one of the two vulnerabilities discovered in the OpenSSL...

Continue Reading

How to Write a SOLID Code

The most crucial thing software engineers must remember is that others will view their code. In addition, other...

Continue Reading

How to create a threat model

Threat modelling identifies security needs, threats and vulnerabilities, their criticality, and prioritizes remedial...

Continue Reading

Spring Framework Vulnerability 2022 | Complete Guide

Spring is the most popular application development framework for enterprise Java. Millions of developers worldwide use...

Continue Reading

How to Secure Kubernetes Secrets

Kubernetes has become the most popular container orchestrator in the industry. It’s powerful, scalable, and flexible...

Continue Reading

Best Static Code Analysis Tools for Source Code

If you are a software developer or a code review security expert, you often need to analyse your source code to detect...

Continue Reading

What is a Supply Chain Attack? Types and Examples

A supply chain attack is when someone uses an outside provider or partner that has access to your data and systems to...

Continue Reading

Spring4Shell: Critical Vulnerability in Java Framework

Researchers found a critical vulnerability in Spring4Shell, a popular Java framework. Here’s how it works, why it’s...

Continue Reading

Essential Security Skills For Application Development

In application development security is a key task when it comes to looking to the future of cybersecurity. A recent...

Continue Reading

API Security: Best Practices You Must Know

What Is API Security API Security is the use of any security practice relating to application programming interfaces...

Continue Reading

Best Practices for Code Review You Really Need

The software development process consists of many activities – one of them (and in our opinion) is the code review...

Continue Reading

Application Security Audit Checklist Template

In this article, the Application Security Audit Checklist Template will cover. In today’s technology landscape,...

Continue Reading

12
Page 1 of 2

O360-logo-white

© Copyright Offensive 360

Facebook-f Twitter Linkedin
Resources
Knowledge-base
DevSecOps
Application Security
O360
How O'360 works
About
Request a demo
Contact Us
Policies
Privacy policy
Terms of Use