Resources

Web Security

Web Security

Second wave of Shai-Hulud npm worm compromises the global software supply chain

Web Security

An abundance of caution: Why the curl buffer overflow is not the next Log4Shell

Web Security

Get Management Buy-in with AppSec Metrics

Web Security

Rapid Reset HTTP/2 vulnerability: When streaming leads to flooding

Web Security

Top 5 application security misconfigurations

Web Security

Hacking the hackers: Borrowing good habits from bad actors

Web Security

How to Streamline Vulnerability Management

Web Security

NIST Cybersecurity Framework gets user-friendly: Upcoming changes in CSF v2.0

Web Security

Surviving the API apocalypse: How to defeat zombie APIs