Close
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo

Blog

Blog
Spring Framework Vulnerability 2022 | Complete Guide

Spring is the most popular application development framework for enterprise Java. Millions of developers worldwide use Spring Framework to create high-performing, easily testable, and reusable code. Spring framework is an open-source Java platform. It was initially written by Rod Johnson […]

by Research Team

Continue Reading

Blog
How to Secure Kubernetes Secrets

Kubernetes has become the most popular container orchestrator in the industry. It’s powerful, scalable, and flexible enough to deploy on-premises or in the cloud. However, with these benefits come some security concerns that are worth addressing. Kubernetes Secrets help you manage an […]

by Research Team

Continue Reading

Blog
Best Static Code Analysis Tools for Source Code

If you are a software developer or a code review security expert, you often need to analyse your source code to detect security flaws and maintain a secure quality code. But there can be many code issues that are hard […]

by Research Team

Continue Reading

Blog
What is a Supply Chain Attack? Types and Examples

A supply chain attack is when someone uses an outside provider or partner that has access to your data and systems to infiltrate your digital infrastructure. The external party will grant the rights to use and manipulate areas of your […]

by Research Team

Continue Reading

Blog
Spring4Shell: Critical Vulnerability in Java Framework

Researchers found a critical vulnerability in Spring4Shell, a popular Java framework. Here’s how it works, why it’s dangerous, and how to protect from it. Researchers have discovered a critical vulnerability CVE-2022-22965, in Spring, an open-source framework for the Java platform. Unfortunately, […]

by Research Team

Continue Reading

Blog
Essential Security Skills For Application Development

In application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill for the years ahead. Demand is expected to increase by 164% over the […]

by Research Team

Continue Reading

Blog
API Security: Best Practices You Must Know

What Is API Security? API Security is the use of any security practice relating to application programming interfaces (APIs), which are common in modern applications. API security involves managing API privacy and access control and the identification and remediation of […]

by Research Team

Continue Reading

Blog
Best Practices for Code Review You Really Need

The software development process consists of many activities – one of them (and in our opinion) is the code review process. Reviewing the code means one developer verifies the quality of code provided by another developer. It’s a tiny thing […]

by Research Team

Continue Reading

Blog
Application Security Audit Checklist Template

In this article, the Application Security Audit Checklist Template will cover. In today’s technology landscape, organizations are supported by web applications that act as essential enablers to streamlining operations. While these applications enable automation, wider collaboration, and ease of sharing […]

by Research Team

Continue Reading

Blog
Most Common Vulnerabilities in Java and How to Fix

It’s easy to think that our code is secure. Most Common Vulnerabilities in Java or potential exploits are often the things we think about last. Most of the time, our thoughts are preoccupied with sprints, scrums, meeting notes, and whatever the […]

by Research Team

Continue Reading

12
Page 1 of 2


O360-logo-white

Utrechtseweg 341,

Amersfoort, Utrecht

3818 EL, NL

© Copyright Offensive 360

Facebook-f Twitter Linkedin
Resources
Knowledge-base
DevSecOps
Application Security
O360
How O'360 works
About
Request a demo
Contact Us
Policies
Privacy policy
Terms of Use