11/09/2022 Do not use String to store secret. It gets disclosed We all know secret keys, passwords, API keys, tokens, payment card data (pin, pan, track2 data, cvv) should never be...
05/09/2022 A dangerous way to fix Integer Overflow in Solidity These submission fail for a good reason. The security vulnerability has not been fixed! Let’s find out why. uint is...
07/06/2022 🔴 Instructor-Led AppSec & DevSecOps Workshops Recordings Over 6 hours of practical AppSec & DevSecOps video workshops This is summary of our live recording from Jan to...
10/05/2022 Kubernetes pod is insecure by default Kubernetes Pod is insecure by default and It runs as root. This security misconfiguration can lead to arbitrary code execution....
31/03/2022 Running a process as root in a container vs running a container as root Running a container as a root is dangerous. But why? Let’s first understand what is the difference between running a...
26/02/2022 Intro to Smart Contract Security and reverse engineering of int overflow dApp security is a whole new world where we should re-learn and change our perspective on security concepts. In this...
28/01/2022 A $10,000 security bug: Identify, exploit and effectively fix SSTI in 2016, Uber paid out $10,000 for a security bug that could result into RCE. In this live workshop, we...
19/01/2022 Parser Differential: A security vulnerability that we are going to live with Parser differential is a security design flaw impacting millions of environment. It is the design flaw behind serious security attack...
06/12/2021 What you see is not what interpreter sees! 1000! Wondering why? Watch December secure programming free workshop