Supply chain risks in AI-driven applications: Securing AI integrations and dependencies
Okta vulnerability explained (bcrypt auth bypass)
eBPF Vulnerabilities: Ecosystem and Security Model
3 AppSec headaches you can cure with Predictive Risk Scoring
Injection Attacks in App Sec: Types, tools, examples
Layered security testing is the way—and DAST is what holds the layers together
Ruby affected by CVE-2024-45409
Insecure deserialization in web applications
Linux Kernel affected by CVE-2023-2163