Legion malware CyberArk browser password identity credentials

Malware Devs Update Legion Hacktool, Boost Capabilities

A recently discovered cloud-focused malware tool has seemingly been updated with additional functionality ...
Security Boulevard
New Design, New Features: Maven Central Improvements for Developers

New Design, New Features: Maven Central Improvements for Developers

Maven Central Repository has made the biggest change to its platform since its inception.Hosted by Sonatype, Maven Central Repository is one of the largest Java repositories in the world. It has helped ...
SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

SLSA and Developer Productivity Meet in 2023

As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life cycle (SDLC). However, most organizations cannot afford to have their security measures negatively ...
Security Boulevard
The State of Application Security with Tanya Janca

The State of Application Security with Tanya Janca

Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current ...
Hacking and Securing Python Applications

Hacking and Securing Python Applications

27 vulnerabilities to look out for in Python applications: Arbitrary file writes, directory traversal, deserialization, and more…Photo by Hitesh Choudhary on UnsplashSecuring applications is not the easiest thing to do. An application has many ...
What Developers Need to Know About the Impact of Compliance Frameworks on Software Development

What Developers Need to Know About the Impact of Compliance Frameworks on Software Development

DeepFactor's brand-new compliance module helps developers identify when vulnerabilities and security risk jeopardize compliance goals For today’s digital businesses, protecting customer data should be a top priority. However, as product teams focus ...
Structure of an API

API vs Webhooks: How to Know When to Use Each

| | Blog, developer, foundations
Applications on the internet today rely a lot on third-party integrations. And why shouldn't they, when it helps developers focus more on the core product than tangling with different features? For instance, ...
ML service with kafka python

Scaling the kafka consumer for a machine learning service in python

| | Blog, developer
Imagine you are supposed to build a python service using machine learning model (trained offline) to detect if a web request is anomalous or not. The requests are coming at a rate ...
Security Teams: You Don’t Need to Frustrate Your Developers

Security Teams: You Don’t Need to Frustrate Your Developers

| | developer, OS islolation
It’s clear to security and technology managers that unsecured developer endpoints can lead to major problems.  A few years ago, there was a famous LinkedIn breach that all started with a hacker ...