03/03/2025 What is wrong with Escaping or Input Sanitization The earliest documented instance of Path Traversal vulnerability is Windows 95 “Dot Dot” bug that goes back to October 1995....
12/12/2024 OWASP Mobile Top 10 Secure Coding Challenges Please find below a list of secure coding challenges for OWASP Mobile Top 10. The goal in each challenge is...
26/09/2024 The Need For Tailored Secure Code Training - Aligning with NIST Cybersecurity and Privacy Learning Program The National Institute of Standards and Technology (NIST) has recently published a Special Publication: 800-50r1, "Building a Cybersecurity and Privacy...
20/09/2024 How to Get a Free Ticket to Black Hat Conference Black Hat is the top global security conference, held annually in the USA, Canada, Europe, Asia, and the Middle East....
23/08/2024 OWASP TOP 10 Secure Coding Challenges Please find below the curated list of secure coding challenges covering OWASP Top 10 security classes. The goal in each...
21/08/2024 OWASP TOP 10 Secure Coding Challenges in Ruby Please find below a sample list of secure coding challenges for Ruby and their alignment with OWASP Top 10. The...
21/08/2024 OWASP TOP 10 Secure Coding Challenges in C# Please find below a sample list of secure coding challenges for C# and their alignment with OWASP Top 10. The...
21/08/2024 OWASP LLM TOP 10 AI Secure Coding Challenges Please find below a sample list of AI secure coding challenges and their alignment with OWASP LLM Top 10. The...
29/07/2024 OWASP TOP 10 Secure Coding Challenges in Java Please find below a sample list of secure coding challenges for Java and their alignment with OWASP Top 10. The...