Hackers are often viewed as modern-day pirates. While mostly true due to the security hazards they create, ethical hackers actually are very helpful in actually improving security standards. Most of these security experts perform these actions simply for the benefit of the community. Rafay Baloch is one such ethical hacker. Baloch, also known as
The modern organization has a wide range of security solutions to pick from for their specific development needs. But picking the right Application Security solution can become quite confusing and overwhelming for CISOs and AppSec experts. Implementing the wrong or unsuitable choice can eventually lead to serious damage from breaches, not far off from having no solution in place.
What exactly is the SDLC? Organizations developing applications have in-place a process by which each application is designed, developed, tested, and deployed. This sequence of stages that define these processes is called the software development lifecycle, often referred to as the SDLC. An organization’s SDLC helps shape the way their apps are built and defines the
What is a Spoofing Attack? A spoofing attack is when an attacker or malicious program successfully acts on another person’s (or program’s) behalf by impersonating data. takes place when the attacker pretends to be someone else (or another computer, device, etc.) on a network in order to trick other computers, devices or people into performing
Are you an AppSec Tweeter? Whether you’re a newbie or an old-timer in the world of application security, Twitter is a great place to listen in and connect with some of the best and brightest in the industry. To help, we’ve compiled a list of some of our favorite tweeters to add to your own
So, what happens when a core component of Mac, Linux and other Unix-based operating systems is found to be highly vulnerable and easily exploitable? Last week, we found out: On September 24th, the world was first introduced to a family of bugs in the Bash shell, being referred to both as ‘Shellshock’ and ‘Bashdoor’. Here’s