AppSec 101 – Dependency Management
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction In the world of software development, managing dependencies is like keeping the gears of a well-oiled machine running smoothly. Get ready to dive deep into practical strategies and tools that streamline your development process, ensuring your projects are as efficient and error-free as possible. This is your guide to mastering dependency management, making every build and deployment predictable and stress-free. Understanding Dependency Management In software development, dependencies refer to external components such as libraries, frameworks, and services that a project requires ..read more
Visit website
AppSec 101 – Error Handling and Logging
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction Have you ever wondered why meticulously coded applications sometimes falter or how the unseen processes within can impact user experience? This article dives into error handling and logging—essential practices that ensure software resilience, security, and maintainability. You’ll learn the significance of these components, understand their implementation, and discover tools that fortify application development.  What is Error Handling? Error handling is the technique developers use to manage unexpected situations in a program’s execution. Think of it as the safety net that c ..read more
Visit website
AppSec 101 – Output Encoding
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction Ever wondered how web apps keep your info safe from hackers? This blog post is all about Output Encoding, a key trick in the web developer’s handbook that stops bad scripts from sneaking into websites and causing trouble. We’re going to show you why it’s super important, how it’s different from other security moves, and how to use it the right way. Stick with us, and you’ll learn some neat ways to make your web projects a lot safer for everyone. What is Output Encoding? Output Encoding is a security technique used in web development to convert potentially harmful characters from ..read more
Visit website
AppSec 101 – Input Validation
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction Ever wondered what separates a secure application from a vulnerable one from a developer’s perspective? It often boils down to how well you handle user inputs. In this blog, we dive into input validation, an essential yet sometimes overlooked aspect of coding for security. It’s a straightforward guide on the why, how, and what of input validation techniques, offering practical insights and actionable tips. By the end, developers will gain valuable skills to enhance app security and improve overall coding efficiency. What is Input Validation? Input validation is like the bouncer a ..read more
Visit website
Understanding XSS vs CSRF
ShiftLeft Blog
by Bruce Snell
1w ago
When it comes to web application vulnerabilities and attacks, malicious actors are a lot like Cookie Monster, screaming, “Me love cookie!” Digital cookies may not be as tasty as chocolate chips, but they’re just as deliciously enticing because they often contain sensitive information or enable attackers to gain unauthorized access.  While both Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks use similar terminology and can impact user access and session cookies, they have different methodologies and impacts. To correctly secure your application, you should understa ..read more
Visit website
AppSec 101 – Session Management
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction How does a website recall your digital footprints during each visit? This article dives into session management, the silent guardian of web navigation, ensuring our virtual moves are remembered and protected. You’ll be equipped with essential insights on maintaining secure and fluid online experiences through robust session management practices. What is Session Management?   Cross-Site Request Forgery (CSRF) is a security flaw that lets attackers force end users to execute unintended actions on a web application where they are currently authenticated. It is a treacherous exp ..read more
Visit website
AppSec 101 – Cross-Site Request Forgery (CSRF)
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction Imagine clicking a link and unintentionally giving a cyber thief access to your data. This article dives into the silent threat of CSRF, where your trusted web session becomes a hacker’s tool. You’ll learn what CSRF is, how it operates, and how you can protect against its deceptive maneuvers. What is Cross-Site Request Forgery (CSRF)? Cross-site request Forgery (CSRF) is a web security vulnerability that tricks users into executing unwanted actions on a web application where they are authenticated.  Unlike other attacks that rely on directly injecting malicious scripts, CSRF ..read more
Visit website
AppSec 101 – Cross-Site Scripting (XSS)
ShiftLeft Blog
by Bruce Snell
1w ago
Introduction Did you know that a simple website visit could put your personal information at risk? In this article, we explain how a common online threat called XSS can cause big problems and show you ways to keep your application secure.  What is Cross-Site Scripting (XSS)? Cross-site scripting (XSS) is a significant web security vulnerability that enables attackers to inject malicious scripts into content that other users see. This type of attack exploits a user’s trust in a particular site, allowing the attacker to send malicious code to an unsuspecting user through the web applicatio ..read more
Visit website
GitHub Hijack: What You Should Know
ShiftLeft Blog
by Bruce Snell
2w ago
Infiltrating the software supply chain is not a new attack method, but the way cybercriminals insinuate themselves and their malicious code into repositories continues to become more sophisticated. Although developers know that any open-source code should be reviewed and vetted, attackers now work to circumvent that practice.  In a recent campaign targeting the software supply chain, researchers found that attackers chained together multiple tactics, techniques, and procedures (TTPs) to evade detection and poison a popular GitHub community.  Steps of the Attack This attack highlights ..read more
Visit website
New Linux Malware Campaign Leverages Docker Misconfigurations
ShiftLeft Blog
by Bruce Snell
1M ago
Misconfigurations are the bane of a developer’s existence and a not-so-secret joy for malicious actors. A recently discovered emerging malware campaign focuses on misconfigured servers to gain initial access, then uses traditional Linux attack techniques to deliver a cryptocurrency miner malware and maintain persistence after spawning a reverse shell.  The malware attack begins by exploiting misconfigurations across the following open-source and proprietary web-facing services: Apache Hadoop YARN Docker Confluence Redis How Attackers Leverage Docker  The attack against Docker uses ..read more
Visit website

Follow ShiftLeft Blog on FeedSpot

Continue with Google
Continue with Apple
OR