Mohamed AboElKheirinAppSec UntangledNew Notion template for Threat modeling published!Hi All, I have an exciting announcement to share! I’ve created a Notion template to help with creating threat models for your projects, you…1 min read·May 3, 2024----
Mohamed AboElKheirinAppSec UntangledHow I contributed my first custom rule to Semgrep Rule RegistrySince I learned that Semgrep enables users to create and use custom SAST rules, I was instantly intrigued. That is mainly because the value…8 min read·Mar 19, 2024----
Mohamed AboElKheirinAppSec UntangledWhat is wrong with this code?Why code reviews/scans are not enough5 min read·Mar 1, 2024----
Mohamed AboElKheirinAppSec UntangledHow to “Shift-Left” SAST scans (Semgrep as an example)“Shift-Left” has become quite the buzzword recently and I assume you probably have already seen a dozen talks and blog posts discussing the…9 min read·Jan 26, 2024----
Mohamed AboElKheirinAppSec UntangledWhy “Chainguard Images” is a game-changer for container vulnerabilitiesI’ve recently tried Chainguard Images and was impressed by the results. Chainguard images are minimized hardened container images that…7 min read·Dec 21, 2023----
Mohamed AboElKheirinAppSec UntangledThreat Modeling Handbook #6: Agile Threat ModelingIt has been a long journey! In the past stories (links below) of this series we discussed in detail how to build a process using threat…8 min read·Nov 21, 2023----
Mohamed AboElKheirinAppSec UntangledThreat Modeling Handbook #5: Convert your threat model into an automated pentest using DevSecOps…Now it is time to make use of what we have completed in phase 1 of the threat modeling process (threat and mitigation identification) in…13 min read·Oct 12, 2023--1--1
Mohamed AboElKheirinAppSec UntangledThreat modeling Handbook #4: How to get better at Threat modelingI know the previous story of this series (links to all previous stories below) was a bit long and may have been a little overwhelming…10 min read·Sep 25, 2023--1--1
Mohamed AboElKheirinAppSec UntangledThreat modeling Handbook #3: The Thought process behind identifying threats (with an Example)Okay, It is time to jump into an actual threat modeling example. But first, let’s start with a quick recap of what was discussed in the…25 min read·Sep 19, 2023--1--1
Mohamed AboElKheirinAppSec UntangledThreat Modeling Handbook #2: Threat modeling is a process, not a documentWelcome back to the 2nd story in the “Threat Modeling Handbook” series. In the last story, we discussed what is a threat model and why it…6 min read·Aug 25, 2023----