In this article, I’m presenting the Exploit Prediction Scoring System and its practical use cases in tandem with Common Vulnerability Scoring System.
In this article, I’m presenting the Exploit Prediction Scoring System and its practical use cases in tandem with Common Vulnerability Scoring System.
Intro Hi!In this edition of my newsletter, I delve into the critical topic of API security with a special focus on Broken Object Level Authorization (BOLA), ranked as the number one threat in the OWASP TOP 10 API Security Risks. The article is presenting Damn Vulnerable RESTaurant as an example of such vulnerability. Furthermore,…
Explaining one of the most common web API vulnerability classes - Broken Object Level Authorization in a practical manner. Providing a case study example based on the Damn Vulnerable RESTaurant API, including methods for identifying and preventing these vulnerabilities.
Intro Hi!Most of the news from last week was related to the XZ backdoor, so I selected the two most interesting articles on this topic. The first article presents a less technical debate about the problem of backdoors in open-source software, written by lcamtuf. The other article is highly technical and describes…
Introduction to a security code challenge dedicated to developers and ethical hackers. This challenge focuses on identifying and fixing web API security vulnerabilities in a Python FastAPI-based restaurant API.
Intro Hi!The first edition of email-based DevSec Selection articles is here! This is actually the fourth iteration of the series, with previous editions published via LinkedIn. I hope you will enjoy this new format, with articles and their short summaries. I’m more than happy to get some feedback from you. Additionally, I plan to launch an…
At the beginning of 2023 Google released an open-source Software Composition Analysis tool — osv-scanner. In this article I'm presenting how it can be configured and utilised using popular open-source projects as examples.
Does DevSecOps Engineer need programming skills? What is the value of utilising Python for security purposes? What you need to learn to automate security at scale? This article will answer these questions.
This article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the AccessibilityService feature. It focuses on identifying these applications from the perspective of legitimate apps.
This article covers automated SBOM projects tracking with Dependency-Track. It presents how SBOM can be uploaded to Dependency-Track via API.