Discover application security technical resources, industry trends, and opinion pieces.

Get the latest on security and software with our newsletter.

Embedded Credentials in Source Code

A Little Backstory Your company secrets are safe, right?  Well, you can’t assume just because you enforce company wide 2-factor authentication on Github that you aren’t vulnerable. A while back

Read More »

ImageMagick RCE Take 2

Introduction A new bypass for GhostScript which ImageMagick uses by default for dealing with PostScript, was posted yesterday which allowed attackers to launch remote code execution. This is similar in

Read More »

Introduction to SQL Injection Mitigation

What is SQL Injection? The popularity of Structured Query Language (SQL) injection attacks has grown significantly over the years and employing relevant mitigation practices will help your application from being

Read More »

Looking for something?

Let us help you find the best way to secure your applications.

According to statistics most web applications are prone to getting hacked. The only question is will it be yours?