Close
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo
One Time Scan
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo
One Time Scan

Offensive 360 Blog

All in one Source Code Analysis, Malware Analysis, Dependency Analysis, License Checks and Infra as Code

 

Most Common Vulnerabilities in Java and How to Fix

It’s easy to think that our code is secure. Most Common Vulnerabilities in Java or potential exploits are often...

Continue Reading

How to Detect Malicious Source Code

Today, modern technology has become an inseparable aspect of our lives. As a result, it’s difficult to think of a...

Continue Reading

CI/CD Pipelines Security Best Practices

For organizations that have embraced DevOps, the CI/CD pipeline is the foundation of the software delivery...

Continue Reading

5 Most Common Vulnerabilities in PHP Code

Vulnerabilities in PHP code are usually caused by a mistake that a developer made when writing the original code. It is...

Continue Reading

Offensive 360 Virtual Compilers

Source code analysis and binary analysis are important to highlight flaws in software without needing to run it,...

Continue Reading

Second-Order SQL Injection Attack – Explained With Examples

Second-Order SQL Injection Attack inserts SQL language code into data requests, causing the application backend...

Continue Reading

Log4J Vulnerability Remediation:

What Is Log4j Log4j is a Java library to log error messages in applications. Web apps, cloud services, and email...

Continue Reading

Achieving Absolute Security in Coding

Achieving absolute security in coding is crucial for software development. Simply speaking, the goal of a developer is...

Continue Reading

How to Perform Application Security Testing?

In our technical landscape, security testing is not receiving the traction it deserves. For this reason, we have...

Continue Reading

How to Prevent Cross-Site Scripting (XSS)?

What is Cross-Site Scripting (XSS) Cross-site scripting is a security vulnerability that can damage an entire website...

Continue Reading

How to Prevent Hardcoded Passwords?

In this article, we’ll be discussing why we should avoid using a hardcoded password in our source code. Apart...

Continue Reading

12
Page 2 of 2

O360-logo-white

Utrechtseweg 341,

Amersfoort, Utrecht

3818 EL, NL

© Copyright Offensive 360

Facebook-f Twitter Linkedin
Resources
Knowledge-base
DevSecOps
Application Security
O360
How O'360 works
About
Request a demo
Contact Us
Policies
Privacy policy
Terms of Use