10th September 2020
We’d like to shine the spotlight on one of our experts, Oscar Quintas. He’s part of our Product Content team, working as a Senior Security Researcher. He’s also our resident sorcerer on all things Infrastructure as Code (IaC).…
25th August 2020
Cyberattacks are only getting more frequent, and threats affecting Linux-based infrastructure are becoming more common, with the end goal being an opportunity to crack open a loot chest of sensitive data stored in the cloud.…
22nd June 2020
This vulnerability can occur when coders fail to properly implement business logic rules, which could leave their applications vulnerable to different kinds of attacks should a malicious user choose to exploit them.…
15th June 2020
The vulnerability-inducing behavior that we are going to focus on here is using code from untrusted sources, a seemingly benign practice that is causing big problems.…
8th June 2020
Security misconfigurations, especially those of the improper permissions variety, most often happen whenever a developer creates a new user or grants permission for an application as a tool in order to accomplish a task.…