Close
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo
One Time Scan
O360-logo
  • Home
  • About
  • Blog
  • Resources
    • Knowledge-base
    • DevSecOps
    • Application Security
  • Contact Us
    • Our Partners
Request a demo
One Time Scan

Blog

Blog
OpenSSL Vulnerabilities: Critical or Not?

The OpenSSL Project announced on October 25 2022 that one of the two vulnerabilities discovered in the OpenSSL library/toolkit was a critical one. The CVEs and patch releases indicate that the vulnerability (CVE-2022-3602) is far from being as severe. The […]

by Research Team

Continue Reading

Blog
How to Write a SOLID Code

The most crucial thing software engineers must remember is that others will view their code. In addition, other engineers would like to build other software applications using your code. Therefore, you need to write neat code that allows your code […]

by Research Team

Continue Reading

12
Jul
Blog
How to create a threat model

Threat modelling identifies security needs, threats and vulnerabilities, their criticality, and prioritizes remedial options.

by Research Team

Continue Reading

Blog
Spring Framework Vulnerability 2022 | Complete Guide

Spring is the most popular application development framework for enterprise Java. Millions of developers worldwide use Spring Framework to create high-performing, easily testable, and reusable code. Spring framework is an open-source Java platform. It was initially written by Rod Johnson […]

by Research Team

Continue Reading

Blog
How to Secure Kubernetes Secrets

Kubernetes has become the most popular container orchestrator in the industry. It’s powerful, scalable, and flexible enough to deploy on-premises or in the cloud. However, with these benefits come some security concerns that are worth addressing. Kubernetes Secrets help you manage an […]

by Research Team

Continue Reading

Blog
Best Static Code Analysis Tools for Source Code

If you are a software developer or a code review security expert, you often need to analyse your source code to detect security flaws and maintain a secure quality code. But there can be many code issues that are hard […]

by Research Team

Continue Reading

Blog
What is a Supply Chain Attack? Types and Examples

A supply chain attack is when someone uses an outside provider or partner that has access to your data and systems to infiltrate your digital infrastructure. The external party will grant the rights to use and manipulate areas of your […]

by Research Team

Continue Reading

Blog
Spring4Shell: Critical Vulnerability in Java Framework

Researchers found a critical vulnerability in Spring4Shell, a popular Java framework. Here’s how it works, why it’s dangerous, and how to protect from it. Researchers have discovered a critical vulnerability CVE-2022-22965, in Spring, an open-source framework for the Java platform. Unfortunately, […]

by Research Team

Continue Reading

Blog
Essential Security Skills For Application Development

In application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill for the years ahead. Demand is expected to increase by 164% over the […]

by Research Team

Continue Reading

Blog
API Security: Best Practices You Must Know

What Is API Security? API Security is the use of any security practice relating to application programming interfaces (APIs), which are common in modern applications. API security involves managing API privacy and access control and the identification and remediation of […]

by Research Team

Continue Reading

123
Page 1 of 3


O360-logo-white

Utrechtseweg 341,

Amersfoort, Utrecht

3818 EL, NL

© Copyright Offensive 360

Facebook-f Twitter Linkedin
Resources
Knowledge-base
DevSecOps
Application Security
O360
How O'360 works
About
Request a demo
Contact Us
Policies
Privacy policy
Terms of Use