unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Hidden Dangers of Abandoned Digital Assets in Open-Source Ecosystems
The digital ocean on which many of us including the world's largest corporations rely on, is fi...
2024-2-8 20:0:0 | 阅读: 15 |
收藏
|
Checkmarx.com - checkmarx.com
abandoned
attackers
hijacking
malicious
hijacked
Preparing for Europe’s Most Extensive Cybersecurity Directive, NIS2 – What AppSec teams need to know
By Carsten Huth February 7, 2024 Regulations are constantly evolving,...
2024-2-7 15:0:0 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
appsec
nis2
carsten
security
checkmarx
Zack Bentolila of Checkmarx Recognized as 2024 CRN® Channel Chief
PARAMUS, N.J. – FEBRUARY 6, 2024 – Checkmarx, the leader in cloud-native application security, anno...
2024-2-7 02:22:33 | 阅读: 5 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
crn
appsec
cloud
bentolila
Container runtime insights to prioritize what matters most
Through an integration with Sysdig, Checkmarx One users can now leverage runtime container insights...
2024-2-6 20:0:0 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
security
sysdig
prioritize
Navigating the Rising Tide of CI/CD Vulnerabilities: The Jenkins and TeamCity Case Studies
In the evolving landscape of cybersecurity, a new threat has emerged, targeting the core of softwar...
2024-2-6 13:0:0 | 阅读: 22 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
threats
jenkins
teamcity
How AI Enables More Effective Static Application Security Testing
By Checkmarx Admin mins read 9:02 Artificial Intelligence In Static A...
2024-2-4 22:2:46 | 阅读: 12 |
收藏
|
Checkmarx.com - checkmarx.com
security
analysis
identify
weaknesses
How AI Enables More Effective Static Application Security Testing
By Checkmarx Admin mins read 9:02 Artificial Intelligence In Static A...
2024-2-4 22:2:46 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
security
analysis
weaknesses
identify
How We Were Able to Infiltrate Attacker Telegram Bots
Key Points Attackers often utilize Telegram bots to extract victims' data. Monitoring an attacker'...
2024-2-2 04:5:10 | 阅读: 22 |
收藏
|
Checkmarx.com - checkmarx.com
attacker
bots
attackers
malicious
webhook
What You Need To Know About NIST 800-218: The Secure Software Development Framework
By John Allison January 31, 2024 With the introduction of the National...
2024-1-31 22:0:0 | 阅读: 16 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
pw
development
Checkmarx’ Approach to Software Supply Chain Security
2023 culminated with an intensified wave of attacks on the software supply chain. Here are just a f...
2024-1-31 20:0:0 | 阅读: 8 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
checkmarx
malicious
Managing the API Sprawl Challenge
Application Programming Interfaces (APIs) serve as crucial intermediaries that facilitate seamless...
2024-1-30 20:0:0 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
sprawl
governance
Static Code Analysis: Why Your Company’s Reputation Depends On It
By Editor mins read 11:37 Sometimes the best way to be proactive about sof...
2024-1-23 00:37:15 | 阅读: 15 |
收藏
|
Checkmarx.com - checkmarx.com
security
analysis
developers
development
Checkmarx Announces New Integrations with ServiceNow
Developers using DevOps Change Velocity can now view Checkmarx scan summaries in DevOps with no imp...
2024-1-22 21:0:0 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
servicenow
security
cloud
developers
APMA: THE NEW APPSEC MATURITY MODEL WITH YOUR SUCCESS IN MIND
We know how important AppSec is to your business’s success. With potential threats growing and evol...
2024-1-22 20:0:0 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
appsec
security
maturity
software
apma
When the Hunter Becomes the Hunted
A cybersecurity researcher, delving into the depths of a malicious Python package, suddenly finds t...
2024-1-19 02:33:19 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
malicious
analysis
shortcut
windows
python
Cloud Application Security: An Enterprise’s Guide to Cyber Resilience
The shift to cloud-based applications has significantly changed how businesses operate.However, thi...
2024-1-15 23:36:41 | 阅读: 17 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
development
threats
Effective SCA Solution: 7 Essential Features for 2024 – Copy
What is Cloud Native Application Security?Cloud native app security is a strategy for developing an...
2024-1-14 17:26:1 | 阅读: 11 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
kubernetes
threats
Cloud-native Application Security: Strategic 4C
What is Cloud Native Application Security?Cloud native app security is a strategy for developing an...
2024-1-14 17:26:1 | 阅读: 11 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
kubernetes
threats
Effective SCA Solution: 7 Essential Features for 2024
Today much of the technology we rely upon to build new applications, particularly cloud-native appl...
2024-1-14 15:26:11 | 阅读: 4 |
收藏
|
Checkmarx.com - checkmarx.com
security
software
checkmarx
analysis
2024 Ultimate SAST Guide for CISOs, AppSecs and DevOps
Static application security testing (SAST) solutions provide organizations with peace of mind that...
2024-1-14 05:43:35 | 阅读: 11 |
收藏
|
Checkmarx.com - checkmarx.com
security
developers
development
dast
Previous
6
7
8
9
10
11
12
13
Next