unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Connecting the dots: Development + business risk + due diligence
Posted by on Friday, May 26, 2023...
2023-5-26 20:0:16 | 阅读: 3 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
diligence
development
security
debt
AppSec Decoded: Easy to scale with Polaris
Posted by on Wednesday, May 24, 2023...
2023-5-25 02:40:14 | 阅读: 6 |
收藏
|
Software Integrity Blog - www.synopsys.com
polaris
software
security
ghosh
cloud
Eliminate malicious code in your software supply chain
Posted by on Wednesday, May 17, 2023...
2023-5-18 00:30:43 | 阅读: 6 |
收藏
|
Software Integrity Blog - www.synopsys.com
malicious
software
analysis
hiding
recognize
Detection strategies to unmask the source of malicious code
Posted by on Wednesday, May 17, 2023...
2023-5-17 22:35:58 | 阅读: 7 |
收藏
|
Software Integrity Blog - www.synopsys.com
malicious
insider
software
inserted
stage
AppSec Decoded: Easy deployment with Polaris
Posted by on Monday, May 15, 2023...
2023-5-16 04:48:42 | 阅读: 10 |
收藏
|
Software Integrity Blog - www.synopsys.com
polaris
software
security
cloud
armerding
The importance of software due diligence for private equity firms
Posted by on Friday, May 12, 2023...
2023-5-12 19:0:56 | 阅读: 6 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
firms
development
equity
identify
Synopsys and ReversingLabs sign agreement to enhance software supply chain risk management
Posted by on Thursday, May 11, 2023...
2023-5-11 19:55:3 | 阅读: 13 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
duck
threats
security
2023 OSSRA deep dive: jQuery and open source security
From the 2023 OSSRA report: our findings on jQuery, open source security, and what it means for yo...
2023-5-10 21:0:3 | 阅读: 10 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
jquery
ossra
codebases
A deep-dive on Pluck CMS vulnerability CVE-2023-25828
CVE-2023-25828 vulnerability; history, mitigation analysis, and everything you need to know about...
2023-5-9 07:18:11 | 阅读: 30 |
收藏
|
Software Integrity Blog - www.synopsys.com
php
albums
pluck
smartimage
CRN’s 2023 Women of the Channel Awards list
Posted by on Monday, May 8, 2023...
2023-5-9 06:39:1 | 阅读: 8 |
收藏
|
Software Integrity Blog - www.synopsys.com
crn
honor
rodriguez
annia
ahrens
CyRC Vulnerability Advisory: CVE-2023-25826 and CVE-2023-25827 in OpenTSDB
Posted by on Tuesday, May 2, 2023...
2023-5-3 00:12:17 | 阅读: 7 |
收藏
|
Software Integrity Blog - www.synopsys.com
opentsdb
github
25826
25827
malicious
Fuzz testing for connected and autonomous vehicles
The previous blog post in this series presented an introduction to secure software development fo...
2023-4-29 00:16:20 | 阅读: 12 |
收藏
|
Software Integrity Blog - www.synopsys.com
network
stations
autonomous
vehicles
vehicle
Software due diligence in M&A: Key considerations and risks
Posted by on Friday, April 28, 2023...
2023-4-28 18:0:51 | 阅读: 11 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
diligence
acquirers
security
We’re one step closer to knowing how to comply with EO 14028
Posted by on Thursday, April 27, 2023...
2023-4-28 06:16:41 | 阅读: 9 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
ssdf
eo
14028
usg
Cloud detection and response, a key asset for cloud security
With the continued move to the cloud, cloud detection and response helps security teams defend the...
2023-4-28 02:20:15 | 阅读: 13 |
收藏
|
Software Integrity Blog - www.synopsys.com
cloud
security
cdr
enhanced
threats
AppSec Decoded: Evaluating threats with threat modeling risk analysis
Posted by on Wednesday, April 26, 2023...
2023-4-27 01:22:22 | 阅读: 15 |
收藏
|
Software Integrity Blog - www.synopsys.com
modeling
analysis
decoded
scoping
gathering
Fast application security testing with the Polaris platform
Polaris Software Integrity Platform® – your application security testing system that can do both S...
2023-4-27 00:39:37 | 阅读: 13 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
polaris
development
appsec
cloud
Improving software supply chain security for cloud applications and workloads
Posted by on Monday, April 24, 2023...
2023-4-25 02:26:44 | 阅读: 15 |
收藏
|
Software Integrity Blog - www.synopsys.com
cloud
security
software
iac
development
AppSec Decoded: Creating an attack model in threat modeling
Posted by on Friday, April 21, 2023...
2023-4-22 01:48:34 | 阅读: 13 |
收藏
|
Software Integrity Blog - www.synopsys.com
modeling
threats
scoping
security
cummings
Friend or foe: AI chatbots in software development
Yes, AI chatbots can write code very fast, but you still need human oversight and security testing...
2023-4-22 01:30:15 | 阅读: 11 |
收藏
|
Software Integrity Blog - www.synopsys.com
chatgpt
software
chatbots
parekh
trained
Previous
1
2
3
4
5
6
7
8
Next