Blog

AppSec Blog

Web Security

Invicti DAST-to-SAST correlation: Fix verified runtime risks at pipeline speed

Web Security

How to prevent CSRF attacks by using anti-CSRF tokens

Web Security

How to Select a DAST Scanner: DAST Solutions and Tools

Web Security

CWE Top 25 for 2024: XSS, SQLi, buffer overflows top the list

Web Security

How to prevent SQL injection

Web Security

How the BEAST attack works: Reading encrypted data without decryption

Web Security

Doubling down on components: SCA and Container Security on the Invicti platform

Web Security

Okta vulnerability explained (bcrypt auth bypass)

Web Security

eBPF Vulnerabilities: Ecosystem and Security Model