Bulitha Kawushika de ZoysaNew CLI and Log Management System Proposal for OWASP SecureCodeBox (Project Proposal)Project Proposal Overview —Apr 7
PRASADHow To Series-Source Code Review Part-2In the previous article we saw about source code review definition, about different tools. In part 2 we will see examples and tips that…Apr 8, 20231
Sean RyanMonitoring Python code quality: Security via Snyk [paid] and Linting via ruff or flake8 [free]Increasingly, Python has become an important language perhaps not so much for technical reasons as that it is simple enough to quickly…Feb 28Feb 28
PRASADSource Code Review Part-3This article will delve into .Net examples and conceptual diagrams pertaining to secure code reviews.Dec 28, 2023Dec 28, 2023
ArunklinTheSecMasterHow Can Developers Use OWASP to Write Secure Coding?Application security breaches have become increasingly common, with over 14 mega-breaches impacting more than 1 million records in the last…Feb 11Feb 11
Bulitha Kawushika de ZoysaNew CLI and Log Management System Proposal for OWASP SecureCodeBox (Project Proposal)Project Proposal Overview —Apr 7
PRASADHow To Series-Source Code Review Part-2In the previous article we saw about source code review definition, about different tools. In part 2 we will see examples and tips that…Apr 8, 20231
Sean RyanMonitoring Python code quality: Security via Snyk [paid] and Linting via ruff or flake8 [free]Increasingly, Python has become an important language perhaps not so much for technical reasons as that it is simple enough to quickly…Feb 28
PRASADSource Code Review Part-3This article will delve into .Net examples and conceptual diagrams pertaining to secure code reviews.Dec 28, 2023
ArunklinTheSecMasterHow Can Developers Use OWASP to Write Secure Coding?Application security breaches have become increasingly common, with over 14 mega-breaches impacting more than 1 million records in the last…Feb 11
Sameer TutejaShare Arduino code without actual codeIts been a while I have been using Arduino boards and the famous Arduino IDE. It's very useful for compiling and uploading codes to boards…Jul 14, 2020
Zuhaib MohammedAudit Anomalies Archive — Issue#8Before delving into the issue at hand, I recommend familiarizing yourself with Issue#7 . Understanding the context is important for…Nov 23, 2023
ParagBagulMastering WordPress Security Effective Strategies Against Cyber ThreatsHi I’m Parag Bagul, a security researcher. In this blog post, we’ll explore how to boost your WordPress site’s security using the…Jun 16, 2023