unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Backdoor Discovered in xz: The Most Advanced Supply Chain Attack Known to Date
By...
2024-4-1 20:24:35 | 阅读: 2 |
收藏
|
Checkmarx.com - checkmarx.com
xz
software
security
jia
tan
PyPi Is Under Attack: Project Creation and User Registration Suspended
By...
2024-3-28 19:31:30 | 阅读: 20 |
收藏
|
Checkmarx.com - checkmarx.com
2024remove
projectpy
projectbip
malicious
software
Checkmarx Announces Partnership with Wiz: Advancing AppSec through Code-to-Cloud Integration
Checkmarx One enterprise AppSec platform now correlates cloud insights from Wiz to deliveractio...
2024-3-26 21:0:23 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
cloud
checkmarx
security
wiz
appsec
Checkmarx + Wiz: Advancing AppSec with Code to Cloud Integration
By...
2024-3-26 20:45:0 | 阅读: 14 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
cloud
wiz
Over 170K Users Affected by Attack Using Fake Python Infrastructure
The Checkmarx Research team recently discovered an attack campaign targeting the software suppl...
2024-3-25 19:0:0 | 阅读: 23 |
收藏
|
Checkmarx.com - checkmarx.com
malicious
attacker
python
github
colorama
SDLC: The Ultimate Guide to Software Development Lifecycle
ByEdit...
2024-3-21 15:54:19 | 阅读: 1 |
收藏
|
Checkmarx.com - checkmarx.com
sdlc
security
development
software
processes
SDLC: The Ultimate Guide to Software Development Lifecycle
By...
2024-3-21 15:54:19 | 阅读: 8 |
收藏
|
Checkmarx.com - checkmarx.com
sdlc
security
development
software
processes
What is SCA (Software Composition Analysis) and how does it work
Modern applications commonly include not just original source code written by the developers wh...
2024-3-20 17:40:18 | 阅读: 7 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
software
licensing
analysis
What is SCA (Software Composition Analysis) and how does it work
Modern applications commonly include not just original source code written by the developers wh...
2024-3-20 17:40:18 | 阅读: 0 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
software
composition
licensing
What is Common Vulnerability Scoring System (CVSS)
Every security vulnerability is unique. Different vulnerabilities impact different systems, inv...
2024-3-19 00:19:40 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
scores
scoring
network
checkmarx
The Ultimate Guide to Software Supply Chain Security
ByYohai Wes...
2024-3-18 21:44:18 | 阅读: 28 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
malicious
checkmarx
slsa
Checkmarx and Security Compass Announce Partnership to Integrate Checkmarx One with SD Elements
Joint customers can design and assess coverage and completion of threat models in a seamless p...
2024-3-6 20:0:18 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
development
modeling
compass
What is Application Security – How Does It Work & Best Practices
Applications are a key component of virtually any IT environment. For that reason, managing...
2024-3-5 20:41:4 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
security
software
injection
threats
GitHub Repos Used for Distributing Malware
By...
2024-3-5 01:48:58 | 阅读: 15 |
收藏
|
Checkmarx.com - checkmarx.com
github
checkmarx
yehuda
security
malicious
What is SQL Injection, Examples and How to Prevent It
TypeError: Too many redirects.https://checkmarx.com/glossary/sql-injection-attacks/, https://checkma...
2024-3-4 21:16:52 | 阅读: 3 |
收藏
|
Checkmarx.com - checkmarx.com
glossary
injection
checkmarx
typeerror
What is SQL Injection, Examples and How to Prevent It
SQL Injection: Everything You Need to KnowAccepting input from users is a core requirement for...
2024-3-4 21:16:52 | 阅读: 13 |
收藏
|
Checkmarx.com - checkmarx.com
injection
database
malicious
attackers
username
What is SQL Injection, Examples and How to Prevent It
SQL Injection: Everything You Need to KnowAccepting input from users is a core requirement for...
2024-3-4 21:16:52 | 阅读: 0 |
收藏
|
Checkmarx.com - checkmarx.com
injection
database
malicious
attackers
username
SAST vs. DAST: Comparing Appsec Testing Methods
ByAvi Hein...
2024-3-4 20:49:24 | 阅读: 23 |
收藏
|
Checkmarx.com - checkmarx.com
dast
security
checkmarx
sdlc
SAST vs. DAST: Comparing Appsec Testing Methods
ByAvi Hein...
2024-3-4 20:49:24 | 阅读: 33 |
收藏
|
Checkmarx.com - checkmarx.com
dast
security
checkmarx
sdlc
The Future of AppSec: Insights from Development & Security Professionals
By...
2024-2-29 23:0:0 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
appsec
avi
cloud
Previous
4
5
6
7
8
9
10
11
Next