InAWS MoroccobyZakaria EL BAZI 🇲🇦Secure Secrets Management in Terraform — Part1: Leveraging AWS KMSOne of the key principles of modern Infrastructure as Code is the secure management of sensitive information. In thins first part of our…Nov 16
Vladimir GusarovManaged DevOps Pools: Simplifying Self-Hosted Azure Pipeline AgentsIn enterprise software development, the reliability and repeatability of your development process are paramount. To ensure this, we enforce…Aug 91
InFraktalbyToni HuttunenAndroid Apps Full Storage AttackIntroduction The Full Storage Attack exploits improper error handling in many Android apps to bypass PIN access control mechanism.Nov 11Nov 11
Hadiyal UrmalHow to Implement Azure Key Vault with .NET 8 Web APIMaking Your .NET 8 Web API Secure and Hassle-Free with Azure Key VaultAug 3Aug 3
Amine RajiWhen Logs Save the Day: A Developer’s Guide to Security LoggingSecurity logging: “Real” Stories from the Development TrenchesNov 4Nov 4
InAWS MoroccobyZakaria EL BAZI 🇲🇦Secure Secrets Management in Terraform — Part1: Leveraging AWS KMSOne of the key principles of modern Infrastructure as Code is the secure management of sensitive information. In thins first part of our…Nov 16
Vladimir GusarovManaged DevOps Pools: Simplifying Self-Hosted Azure Pipeline AgentsIn enterprise software development, the reliability and repeatability of your development process are paramount. To ensure this, we enforce…Aug 91
InFraktalbyToni HuttunenAndroid Apps Full Storage AttackIntroduction The Full Storage Attack exploits improper error handling in many Android apps to bypass PIN access control mechanism.Nov 11
Hadiyal UrmalHow to Implement Azure Key Vault with .NET 8 Web APIMaking Your .NET 8 Web API Secure and Hassle-Free with Azure Key VaultAug 3
Amine RajiWhen Logs Save the Day: A Developer’s Guide to Security LoggingSecurity logging: “Real” Stories from the Development TrenchesNov 4
InCoinmonksbyahmetw.ethSmart Contract Security: tx.origin Authorization Attack VectorsHola a todos!Nov 21, 2023
Vladimir GusarovAzure DevOps OAuth Apps End-of-Life: Key Changes You Need to KnowAzure DevOps OAuth apps have been on the path to deprecation for quite some time now, so the recent updates from Microsoft might not come…Oct 30
Tiva AdhistiImplementing OWASP Standards for Secure DevelopmentOWASP (Open Web Application Security Project) is a global organization that focuses on improving web application security. One of their…Nov 28