InBug Bounty HuntingbyRonnie JosephSecure System Design for scalable Token RevocationA major fintech company’s payment application, processing over 1 million transactions daily, recently experienced a security incident where…Nov 28
NamrataSecure Coding Best Practices — Part 2reducing the chances of malicious actors exploiting your intellectual property are code minification and code obfuscation.Nov 14
NamrataSecure Coding Best Practices — Part 1Code security is not just a technical concern; it involves a multi-layered approach that integrates security practices.Nov 12Nov 12
appsecwarriorHow To Series-Source Code Review Part-2In the previous article we saw about source code review definition, about different tools. In part 2 we will see examples and tips that…Apr 8, 20231Apr 8, 20231
InBug Bounty HuntingbyRonnie JosephSecure System Design for scalable Token RevocationA major fintech company’s payment application, processing over 1 million transactions daily, recently experienced a security incident where…Nov 28
NamrataSecure Coding Best Practices — Part 2reducing the chances of malicious actors exploiting your intellectual property are code minification and code obfuscation.Nov 14
NamrataSecure Coding Best Practices — Part 1Code security is not just a technical concern; it involves a multi-layered approach that integrates security practices.Nov 12
appsecwarriorHow To Series-Source Code Review Part-2In the previous article we saw about source code review definition, about different tools. In part 2 we will see examples and tips that…Apr 8, 20231
InPVS-StudiobyUnicorn DeveloperXSS: attack, defense — and C# programmingXSS — or cross-site scripting — is one of the most common vulnerabilities in web applications. It has been on the OWASP Top 10 list (the…Aug 24, 2021
Sean RyanMonitoring Python code quality: Security via Snyk [paid] and Linting via ruff or flake8 [free]Increasingly, Python has become an important language perhaps not so much for technical reasons as that it is simple enough to quickly…Feb 28
Bulitha Kawushika de ZoysaNew CLI and Log Management System Proposal for OWASP SecureCodeBox (Project Proposal)Project Proposal Overview —Apr 7