Offensive360 blog

All in one Source Code Analysis, Malware Analysis, Dependency Analysis, License Checks and Infra as Code

19
Apr
How to Secure Kubernetes Secrets
How to Secure Kubernetes Secrets

Kubernetes has become the most popular container orchestrator in the industry. It’s powerful,...

Continue Reading

14
Apr
Best Static Code Analysis Tools for Source Code
Best Static Code Analysis Tools for Source Code

If you are a software developer or a code review security expert, you often need to analyse your...

Continue Reading

08
Apr
What is a Supply Chain Attack? Types and Examples
What is a Supply Chain Attack? Types and Examples

A supply chain attack is when someone uses an outside provider or partner that has access to your...

Continue Reading

04
Apr
Spring4Shell: Critical Vulnerability in Java Framework
Spring4Shell: Critical Vulnerability in Java Framework

Researchers found a critical vulnerability in Spring4Shell, a popular Java framework. Here’s how...

Continue Reading

25
Jan
Essential Security Skills For Application Development
Essential Security Skills For Application Development

In application development security is a key task when it comes to looking to the future of...

Continue Reading

23
Jan
API Security: Best Practices You Must Know
API Security: Best Practices You Must Know

What Is API Security API Security is the use of any security practice relating to application...

Continue Reading

21
Jan
Best Practices for Code Review You Really Need
Best Practices for Code Review You Really Need

The software development process consists of many activities – one of them (and in our opinion)...

Continue Reading

21
Jan
Application Security Audit Checklist Template
Application Security Audit Checklist Template

In this article, the Application Security Audit Checklist Template will cover. In today’s...

Continue Reading

15
Jan
Most Common Vulnerabilities in Java and How to Fix
Most Common Vulnerabilities in Java and How to Fix

It’s easy to think that our code is secure. Most Common Vulnerabilities in Java or potential...

Continue Reading

Page 2 of 4