developer
Malware Devs Update Legion Hacktool, Boost Capabilities
A recently discovered cloud-focused malware tool has seemingly been updated with additional functionality ...
New Design, New Features: Maven Central Improvements for Developers
Maven Central Repository has made the biggest change to its platform since its inception.Hosted by Sonatype, Maven Central Repository is one of the largest Java repositories in the world. It has helped ...
SLSA and Developer Productivity Meet in 2023
As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life cycle (SDLC). However, most organizations cannot afford to have their security measures negatively ...
The State of Application Security with Tanya Janca
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current ...
Hacking and Securing Python Applications
27 vulnerabilities to look out for in Python applications: Arbitrary file writes, directory traversal, deserialization, and more…Photo by Hitesh Choudhary on UnsplashSecuring applications is not the easiest thing to do. An application has many ...
What Developers Need to Know About the Impact of Compliance Frameworks on Software Development
DeepFactor's brand-new compliance module helps developers identify when vulnerabilities and security risk jeopardize compliance goals For today’s digital businesses, protecting customer data should be a top priority. However, as product teams focus ...
API vs Webhooks: How to Know When to Use Each
Applications on the internet today rely a lot on third-party integrations. And why shouldn't they, when it helps developers focus more on the core product than tangling with different features? For instance, ...
Scaling the kafka consumer for a machine learning service in python
Imagine you are supposed to build a python service using machine learning model (trained offline) to detect if a web request is anomalous or not. The requests are coming at a rate ...
Security Teams: You Don’t Need to Frustrate Your Developers
It’s clear to security and technology managers that unsecured developer endpoints can lead to major problems. A few years ago, there was a famous LinkedIn breach that all started with a hacker ...