Ajay MongaInside SAST Tools: How They Work and Why You Need ThemThe Inner Workings of SAST Tools: An In-Depth Exploration and How Static Application Security Testing Works2d ago
GiannakopoulosjSonarQube & OWASP Dependency Check for JavaStatic Code Analysis and Security for a Java ProjectApr 153
n00🔑Static Application Security Testing using “semgrep”Static Application Security Testing (SAST) is an essential part of modern software development. It helps developers identify…Jul 1Jul 1
Ajay MongaUnderstanding Information Disclosure Vulnerability: Types, Causes, and Mitigation Strategies And…Information Disclosure Vulnerability Example in Java. A Practical Guide to Protecting Sensitive InformationJun 27Jun 27
Ajay MongaInside SAST Tools: How They Work and Why You Need ThemThe Inner Workings of SAST Tools: An In-Depth Exploration and How Static Application Security Testing Works2d ago
GiannakopoulosjSonarQube & OWASP Dependency Check for JavaStatic Code Analysis and Security for a Java ProjectApr 153
n00🔑Static Application Security Testing using “semgrep”Static Application Security Testing (SAST) is an essential part of modern software development. It helps developers identify…Jul 1
Ajay MongaUnderstanding Information Disclosure Vulnerability: Types, Causes, and Mitigation Strategies And…Information Disclosure Vulnerability Example in Java. A Practical Guide to Protecting Sensitive InformationJun 27
Dmitry ChTop 10 Secret Scanning toolsJoin me on LinkedIn and stay updated on the latest DevSecOps industry trends, valuable insights, and exciting opportunities!Jun 14
Ajay MongaOpen Redirect Vulnerabilities: Understanding and mitigations in JavaScriptAn Open Redirect Vulnerability occurs when a web application accepts a user-controlled input that directs the user to a different URL. This…Mar 2