unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
CyRC Vulnerability Advisory: Local privilege escalation in Kaspersky VPN
Posted by on Thursday, August 4, 2022...
2022-8-4 22:50:23 | 阅读: 47 |
收藏
|
www.synopsys.com
microsoft
cyrc
windows
27535
CyRC Vulnerability Analysis: Repo jacking in the software supply chain
Repo jacking is often the first step in a supply chain attack. Learn the security methods and tool...
2022-8-3 01:25:10 | 阅读: 29 |
收藏
|
www.synopsys.com
repository
malicious
security
hijacking
jacking
Introducing IaC Security from Black Duck
Posted by on Friday, July 29, 2022...
2022-7-30 01:0:17 | 阅读: 25 |
收藏
|
www.synopsys.com
iac
security
duck
development
developers
Five types of software licenses you need to understand
Different types of software licenses require you to meet certain obligations if you want to reuse...
2022-7-27 23:30:13 | 阅读: 22 |
收藏
|
www.synopsys.com
software
copyleft
obligations
licensed
proprietary
Bridging the security gap in continuous testing and the CI/CD pipeline
Learn why Synopsys earned the highest score for the Continuous Testing Use Case in Gartner’s lates...
2022-7-26 02:41:38 | 阅读: 23 |
收藏
|
www.synopsys.com
security
development
software
seeker
dast
Out-of-band application security with Intelligent Orchestration
Posted by on Thursday, July 21, 2022...
2022-7-22 05:50:3 | 阅读: 40 |
收藏
|
www.synopsys.com
security
development
software
intelligent
Interview-based due diligence or software audits?
Posted by on Wednesday, July 20, 2022...
2022-7-20 22:57:35 | 阅读: 19 |
收藏
|
www.synopsys.com
diligence
software
audits
analysis
acquirers
Appsec Decoded: Application security orchestration and correlation
Posted by on Tuesday, July 19, 2022...
2022-7-19 23:47:44 | 阅读: 28 |
收藏
|
www.synopsys.com
security
asoc
correlation
development
software
AppSec Decoded: Get the most out of your open source software
Posted by on Thursday, July 14, 2022...
2022-7-15 00:34:42 | 阅读: 21 |
收藏
|
www.synopsys.com
software
security
buying
analysis
codebases
Top open source licenses and legal risk for developers
Learn about the top open source licenses used by developers, including the 20 most popular open so...
2022-7-13 22:30:0 | 阅读: 30 |
收藏
|
www.synopsys.com
software
duck
permissive
developers
eclipse
Build a holistic AppSec program
What does it mean to build a holistic AppSec program? Learn what’s involved in a holistic approach...
2022-7-12 01:18:2 | 阅读: 21 |
收藏
|
www.synopsys.com
security
software
appsec
processes
development
The M&A Open Source Risk Number
Posted by on Friday, July 8, 2022...
2022-7-9 00:22:23 | 阅读: 26 |
收藏
|
www.synopsys.com
codebases
ossra
audits
codebase
CyRC Vulnerability of the Month: curl
Posted by on Thursday, July 7, 2022...
2022-7-8 01:17:24 | 阅读: 38 |
收藏
|
www.synopsys.com
bdsa
rl
security
au
ccvss2
OWASP API Security Top 10: Security risks that should be on your radar
The OWASP API Security Top 10 list highlights the most critical API security risks to web applicat...
2022-7-6 03:0:13 | 阅读: 23 |
收藏
|
www.synopsys.com
security
developers
attackers
malicious
CyRC Vulnerability of the Month: Spring Framework
Posted by on Thursday, June 30, 2022...
2022-7-1 00:0:0 | 阅读: 34 |
收藏
|
www.synopsys.com
security
pivotal
bdsa
1700
tenable
Celebrating one year of Rapid Scan Static
As we celebrate the first anniversary of Rapid Scan Static, we look back at the growth of our new...
2022-6-28 01:47:47 | 阅读: 28 |
收藏
|
www.synopsys.com
coverity
iac
cloud
checkers
sight
M&A, trust in software, and a good night’s sleep
Posted by on Thursday, June 23, 2022...
2022-6-23 23:0:11 | 阅读: 22 |
收藏
|
www.synopsys.com
software
diligence
acquirers
night
triangle
WhiteHat brings new dimension to DAST capabilities at Synopsys
Home Application Securi...
2022-6-23 05:16:7 | 阅读: 23 |
收藏
|
www.synopsys.com
carr
security
laurie
acquisition
portfolio
WhiteHat brings new dimension to DAST capabilities at Synopsys
Posted by on Wednesday, June 22, 2022...
2022-6-23 04:5:40 | 阅读: 22 |
收藏
|
www.synopsys.com
dast
whitehat
security
portfolio
Critical aspects of securing your enterprise applications
Mitigating the risks associated with complex enterprise applications requires securing every compo...
2022-6-16 21:45:7 | 阅读: 21 |
收藏
|
www.synopsys.com
software
security
developers
stage
development
Previous
8
9
10
11
12
13
14
15
Next