• Features
  • About us
  • Resources
    • Knowledge Base
    • DevSecOps
    • Application Security
    • Blog
    • FAQ
  • Contact Us
  • Book Demo
  • Features
  • About us
  • Resources
    • Knowledge Base
    • DevSecOps
    • Application Security
    • Blog
    • FAQ
  • Contact Us
  • Book Demo
  • Features
  • About us
  • Resources
    • Knowledge Base
    • DevSecOps
    • Application Security
    • Blog
    • FAQ
  • Contact Us
  • Book Demo

Blog

OpenSSL Vulnerabilities: Critical or Not?

The OpenSSL Project announced on October 25 2022 that one of the two vulnerabilities discovered in the OpenSSL library/toolkit was a critical one. The CVEs and patch releases indicate that the vulnerability (CVE-2022-3602) is far from being as severe. The […]

by Research Team

Continue Reading

How to Write a SOLID Code

The most crucial thing software engineers must remember is that others will view their code. In addition, other engineers would like to build other software applications using your code. Therefore, you need to write neat code that allows your code […]

by Research Team

Continue Reading

12
Jul
How to create a threat model

Threat modelling identifies security needs, threats and vulnerabilities, their criticality, and prioritizes remedial options.

by Research Team

Continue Reading

Spring Framework Vulnerability 2022 | Complete Guide

Spring is the most popular application development framework for enterprise Java. Millions of developers worldwide use Spring Framework to create high-performing, easily testable, and reusable code. Spring framework is an open-source Java platform. It was initially written by Rod Johnson […]

by Research Team

Continue Reading

How to Secure Kubernetes Secrets

Kubernetes has become the most popular container orchestrator in the industry. It’s powerful, scalable, and flexible enough to deploy on-premises or in the cloud. However, with these benefits come some security concerns that are worth addressing. Kubernetes Secrets help you manage an […]

by Research Team

Continue Reading

Best Static Code Analysis Tools for Source Code

If you are a software developer or a code review security expert, you often need to analyse your source code to detect security flaws and maintain a secure quality code. But there can be many code issues that are hard […]

by Research Team

Continue Reading

What is a Supply Chain Attack? Types and Examples

A supply chain attack is when someone uses an outside provider or partner that has access to your data and systems to infiltrate your digital infrastructure. The external party will grant the rights to use and manipulate areas of your […]

by Research Team

Continue Reading

Spring4Shell: Critical Vulnerability in Java Framework

Researchers found a critical vulnerability in Spring4Shell, a popular Java framework. Here’s how it works, why it’s dangerous, and how to protect from it. Researchers have discovered a critical vulnerability CVE-2022-22965, in Spring, an open-source framework for the Java platform. Unfortunately, […]

by Research Team

Continue Reading

Essential Security Skills For Application Development

In application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill for the years ahead. Demand is expected to increase by 164% over the […]

by Research Team

Continue Reading

API Security: Best Practices You Must Know

What Is API Security? API Security is the use of any security practice relating to application programming interfaces (APIs), which are common in modern applications. API security involves managing API privacy and access control and the identification and remediation of […]

by Research Team

Continue Reading

123
Page 1 of 3


Github Twitter Linkedin
Copyright © Offensive360 2023

Product

  • About O360
  • Request a demo

Company

  • About us
  • Contact us

Resources

  • Knowledge-base
  • DevSecOps
  • Application Security
  • Blog

Policies

  • Privacy Policy
  • Terms of Use