Offensive360 blog

All in one Source Code Analysis, Malware Analysis, Dependency Analysis, License Checks and Infra as Code

06
Jan
How to Detect Malicious Source Code
How to Detect Malicious Source Code

Today, modern technology has become an inseparable aspect of our lives. As a result, it’s...

Continue Reading

02
Jan
CI/CD Pipelines Security Best Practices
CI/CD Pipelines Security Best Practices

For organizations that have embraced DevOps, the CI/CD pipeline is the foundation of the...

Continue Reading

30
Dec
5 Most Common Vulnerabilities in PHP Code

Vulnerabilities in PHP code are usually caused by a mistake that a developer made when writing the...

Continue Reading

26
Dec
Offensive 360 Virtual Compilers
Offensive 360 Virtual Compilers

Source code analysis and binary analysis are important to highlight flaws in software without...

Continue Reading

21
Dec
Second-Order SQL Injection Attack - Explained
Second-Order SQL Injection Attack – Explained With Examples

Second-Order SQL Injection Attack inserts SQL language code into data requests, causing the...

Continue Reading

18
Dec
Log4J Vulnerability Remediation:
Log4J Vulnerability Remediation:

What Is Log4j Log4j is a Java library to log error messages in applications. Web apps, cloud...

Continue Reading

07
Dec
Achieving Absolute Security in Coding
Achieving Absolute Security in Coding

Achieving absolute security in coding is crucial for software development. Simply speaking, the...

Continue Reading

07
Dec
_0002_How to Perform Application Security Testing
How to Perform Application Security Testing?

In our technical landscape, security testing is not receiving the traction it deserves. For this...

Continue Reading

07
Dec
How to Prevent Cross-Site Scripting (XSS)
How to Prevent Cross-Site Scripting (XSS)?

What is Cross-Site Scripting (XSS) Cross-site scripting is a security vulnerability that can damage...

Continue Reading

Page 3 of 4