unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Checkmarx One Total Economic Impact Study Finds Return on Investment of 177% in Fewer Than Six Months and Gain of $7.13M in Benefits Over Three Years
New independent study of a global, $10 billion composite organization with 1000 developersdemon...
2024-4-4 19:0:31 | 阅读: 2 |
收藏
|
Checkmarx.com - checkmarx.com
checkmarx
security
appsec
developers
What Is IaC Security, and How Does It Work?
Infrastructure-as-Code, or IaC, is a great way to add speed and efficiency to the complex w...
2024-4-4 17:30:12 | 阅读: 3 |
收藏
|
Checkmarx.com - checkmarx.com
iac
security
approaches
buckets
What is Cloud-native Application Security, and How Does It Work?
Cloud-native applications are different in manyways from traditional apps. Cloud-native app...
2024-4-4 17:9:51 | 阅读: 5 |
收藏
|
Checkmarx.com - checkmarx.com
cloud
security
development
software
Code to Cloud Security: Best Practices
Code to Cloud Security is a security approach that turns security into an integral part of...
2024-4-4 16:59:23 | 阅读: 4 |
收藏
|
Checkmarx.com - checkmarx.com
security
cloud
development
appsec
What Is DAST? Dynamic Application Security Testing Explained
Most security testing strategies begin with scanning application source code or binaries before...
2024-4-4 16:53:14 | 阅读: 2 |
收藏
|
Checkmarx.com - checkmarx.com
dast
security
software
checkmarx
6 Types of SCA Tools to Help Improve Security
Now that we’ve covered the essentials of what SCA does and how to use it, let’s discuss the cru...
2024-4-2 22:11:35 | 阅读: 4 |
收藏
|
Checkmarx.com - checkmarx.com
developers
library
security
software
Backdoor Discovered in xz: The Most Advanced Supply Chain Attack Known to Date
By...
2024-4-1 20:24:35 | 阅读: 1 |
收藏
|
Checkmarx.com - checkmarx.com
xz
software
security
jia
tan
PyPi Is Under Attack: Project Creation and User Registration Suspended
By...
2024-3-28 19:31:30 | 阅读: 19 |
收藏
|
Checkmarx.com - checkmarx.com
2024remove
projectpy
projectbip
malicious
software
Checkmarx Announces Partnership with Wiz: Advancing AppSec through Code-to-Cloud Integration
Checkmarx One enterprise AppSec platform now correlates cloud insights from Wiz to deliveractio...
2024-3-26 21:0:23 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
cloud
checkmarx
security
wiz
appsec
Checkmarx + Wiz: Advancing AppSec with Code to Cloud Integration
By...
2024-3-26 20:45:0 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
cloud
wiz
Over 170K Users Affected by Attack Using Fake Python Infrastructure
The Checkmarx Research team recently discovered an attack campaign targeting the software suppl...
2024-3-25 19:0:0 | 阅读: 21 |
收藏
|
Checkmarx.com - checkmarx.com
malicious
attacker
python
github
colorama
SDLC: The Ultimate Guide to Software Development Lifecycle
ByEdit...
2024-3-21 15:54:19 | 阅读: 0 |
收藏
|
Checkmarx.com - checkmarx.com
sdlc
security
development
software
processes
SDLC: The Ultimate Guide to Software Development Lifecycle
By...
2024-3-21 15:54:19 | 阅读: 5 |
收藏
|
Checkmarx.com - checkmarx.com
sdlc
security
development
software
processes
What is SCA (Software Composition Analysis) and how does it work
Modern applications commonly include not just original source code written by the developers wh...
2024-3-20 17:40:18 | 阅读: 7 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
software
licensing
analysis
What is SCA (Software Composition Analysis) and how does it work
Modern applications commonly include not just original source code written by the developers wh...
2024-3-20 17:40:18 | 阅读: 0 |
收藏
|
Checkmarx.com - checkmarx.com
developers
security
software
composition
licensing
What is Common Vulnerability Scoring System (CVSS)
Every security vulnerability is unique. Different vulnerabilities impact different systems, inv...
2024-3-19 00:19:40 | 阅读: 10 |
收藏
|
Checkmarx.com - checkmarx.com
scores
scoring
network
checkmarx
The Ultimate Guide to Software Supply Chain Security
ByYohai Wes...
2024-3-18 21:44:18 | 阅读: 28 |
收藏
|
Checkmarx.com - checkmarx.com
software
security
malicious
checkmarx
slsa
Checkmarx and Security Compass Announce Partnership to Integrate Checkmarx One with SD Elements
Joint customers can design and assess coverage and completion of threat models in a seamless p...
2024-3-6 20:0:18 | 阅读: 15 |
收藏
|
Checkmarx.com - checkmarx.com
security
checkmarx
development
modeling
compass
What is Application Security – How Does It Work & Best Practices
Applications are a key component of virtually any IT environment. For that reason, managing...
2024-3-5 20:41:4 | 阅读: 9 |
收藏
|
Checkmarx.com - checkmarx.com
security
software
injection
threats
GitHub Repos Used for Distributing Malware
By...
2024-3-5 01:48:58 | 阅读: 15 |
收藏
|
Checkmarx.com - checkmarx.com
github
checkmarx
yehuda
security
malicious
Previous
2
3
4
5
6
7
8
9
Next