unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
AppSec Decoded: Takeaways from the 2022 “Software Vulnerability Snapshot” report
Posted by on Monday, February 27, 2023...
2023-2-28 01:58:4 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
security
takeaways
The step-by-step guide to threat modeling
Securing your software requires a mix of automated and manual processes, and threat modeling is a...
2023-2-15 02:15:29 | 阅读: 20 |
收藏
|
Software Integrity Blog - www.synopsys.com
modeling
security
software
analysis
diagram
OWASP Top 10: Cryptographic failures
Posted by on Monday, February 13, 2023...
2023-2-13 20:0:45 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
encryption
security
jonathan
knudsen
Navigating software due diligence with a Black Duck Audit
Posted by on Friday, February 10, 2023...
2023-2-10 20:0:46 | 阅读: 16 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
diligence
audits
duck
acquirers
CyRC special report: Secure apps? Don’t bet on it
The Cybersecurity Research Center conducted a security analysis of the 10 most popular Android spo...
2023-2-7 21:0:40 | 阅读: 16 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
development
analysis
bdba
Tom Herrmann of the Synopsys Software Integrity Group recognized as 2023 CRN Channel Chief
Posted by on Monday, February 6, 2023...
2023-2-6 23:0:17 | 阅读: 20 |
收藏
|
Software Integrity Blog - www.synopsys.com
crn
herrmann
chiefs
chief
recognized
CyRC Special Report: How companies fared in the aftermath of Log4Shell
Posted by on Friday, February 3, 2023...
2023-2-3 21:30:27 | 阅读: 31 |
收藏
|
Software Integrity Blog - www.synopsys.com
log4j
log4shell
duck
adoption
CyRC Vulnerability Advisory: CVE-2023-23846 Denial-of-Service Vulnerability in Open5GS GTP Library
Posted by on Tuesday, January 31, 2023...
2023-1-31 21:0:26 | 阅读: 28 |
收藏
|
Software Integrity Blog - www.synopsys.com
open5gs
lte
gtp
network
gtpv1
Open source software: A pillar of modern software development
Posted by on Monday, January 30, 2023...
2023-1-31 00:0:49 | 阅读: 16 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
developers
development
security
licensing
Software risks and technical debt: The role of process in determining good software
Posted by on Friday, January 27, 2023...
2023-1-27 21:45:33 | 阅读: 16 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
debt
investors
development
lawyers
Black Duck’s New Year’s Resolution
The new Black Duck SCA release offers enhancements to help organizations to better understand the...
2023-1-27 04:5:5 | 阅读: 24 |
收藏
|
Software Integrity Blog - www.synopsys.com
duck
software
security
development
transitive
The case for cloud-based DAST
Reduce complexity, increase scalability, improve cost-efficiency, and strengthen backup / disaster...
2023-1-25 23:0:43 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
dast
security
development
cloud
2023 cybersecurity predictions that should be on your radar
Our 2023 cybersecurity predictions are in. The experts weigh in on trends and how they’ll shape cy...
2023-1-24 02:45:32 | 阅读: 15 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
security
sboms
sammy
migues
Prioritizing open source vulnerabilities in software due diligence
Posted by on Friday, January 20, 2023...
2023-1-20 21:30:27 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
security
bdsas
duck
OWASP Top 10: Broken access control
Posted by on Thursday, January 19, 2023...
2023-1-20 01:45:1 | 阅读: 21 |
收藏
|
Software Integrity Blog - www.synopsys.com
attacker
thursday
incidence
jonathan
Finding hard-coded secrets before you suffer a breach
Your organization could be at risk if you’re not handling hard-coded secrets properly. The Synopsy...
2023-1-18 02:45:19 | 阅读: 30 |
收藏
|
Software Integrity Blog - www.synopsys.com
coded
sight
analysis
ssh
security
AppSec Decoded: The research behind the 2022 “Software Vulnerability Snapshot”
Posted by on Wednesday, January 11, 2023...
2023-1-12 01:0:1 | 阅读: 20 |
收藏
|
Software Integrity Blog - www.synopsys.com
software
security
decoded
mce
appsec
How to choose React Native libraries for secure mobile application development
Learn how to choose React Native libraries that abide by application security principles in order...
2023-1-6 05:15:5 | 阅读: 20 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
client
library
principle
injection
Cybersecurity Research Center Developer Series: The OWASP Top 10
Posted by on Tuesday, January 3, 2023...
2023-1-4 02:30:35 | 阅读: 17 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
tuesday
oversee
The top cyber security stories of 2022
A look in the rearview can tell you a lot about the future, so we revisited the top cyber security...
2022-12-23 05:7:4 | 阅读: 22 |
收藏
|
Software Integrity Blog - www.synopsys.com
security
software
ransomware
gap
Previous
5
6
7
8
9
10
11
12
Next