#application-security
Read more stories on Hashnode
Articles with this tag
Developers using a poisoned ChatGPT-like tool are more prone to including insecure code than those using an IntelliCode-like tool or no tool. This...
A new type of attack affecting major CI/CD service providers. Attackers can exploit CI/CD cache mechanisms to inject malicious code or steal your...
OWASP TOP 10 Web Application Security Risks with examples 👇
Securing container images is essential to ensure the safety and integrity of your applications and infrastructure. Here are five top security...
The attack surface of a software supply chain extends beyond just your third-party dependencies. 🛡️ It encompasses the people, processes, and...
Are you familiar with the most common types of malware? If not, let me introduce them to you through today's comic strip.