| | Exploiting JNDI Injections in Java (2019) (veracode.com) |
|
2 points by crummy on Dec 17, 2021 | past
|
| | State of Software Security: open-source Edition (veracode.com) |
|
26 points by giuliomagnifico on June 27, 2021 | past | 5 comments
|
| | How to Set Up Veracode in a Large Azure Project (veracode.com) |
|
1 point by bramkrom on April 23, 2021 | past
|
| | Top Security Anti-Patterns in Asp.net Core Applications (veracode.com) |
|
2 points by relaxnow on March 2, 2021 | past
|
| | Secure Coding Challenge at Veracode (veracode.com) |
|
5 points by jalane81 on Jan 11, 2021 | past
|
| | State of Software Security Flaw Frequency by Language [pdf] (veracode.com) |
|
8 points by adityatelange on Dec 25, 2020 | past | 1 comment
|
| | State of Software Security for 2020 (veracode.com) |
|
1 point by pjmlp on Dec 22, 2020 | past
|
| | Write code that protects sensitive user data (veracode.com) |
|
1 point by jalane81 on Sept 17, 2020 | past
|
| | Veracode Launches Free Community Edition of Security Labs for Developers (veracode.com) |
|
2 points by jalane81 on Aug 4, 2020 | past
|
| | State of Software Security: open-source Edition (veracode.com) |
|
1 point by based2 on May 21, 2020 | past | 1 comment
|
| | ISO: Principal Java Developer for New Product (veracode.com) |
|
2 points by lgagnon on Feb 4, 2019 | past
|
| | Exploiting JNDI Injections in Java (veracode.com) |
|
1 point by based2 on Jan 3, 2019 | past
|
| | SourceClear acquired by Veracode (veracode.com) |
|
1 point by tensor on June 13, 2018 | past
|
| | How a Single Phone Call Can Compromise Your Company (veracode.com) |
|
3 points by Neostrategos on Sept 13, 2017 | past
|
| | Anatomy of a Cross-Site Scripting Flaw in the Telerik Reporting Module (veracode.com) |
|
1 point by relaxnow on June 6, 2017 | past
|
| | Encryption and Decryption in Java Cryptography (veracode.com) |
|
1 point by Neostrategos on April 19, 2017 | past
|
| | Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) (veracode.com) |
|
3 points by Neostrategos on March 29, 2017 | past
|
| | Supporting software that spans over 50 years of history (veracode.com) |
|
2 points by Neostrategos on Oct 5, 2016 | past
|
| | Why DevOps Is Not DevSecOps (veracode.com) |
|
1 point by DrinkWater on Sept 1, 2016 | past
|
| | A developer’s perspective on last minute security requirements (veracode.com) |
|
1 point by Neostrategos on Feb 3, 2016 | past
|
| | 3 Easy Steps to Making Perfect Security Possible (veracode.com) |
|
1 point by Neostrategos on Oct 27, 2015 | past
|
| | AngularJS Expression Security Internals (veracode.com) |
|
3 points by sprkyco on June 25, 2015 | past
|
| | Popular Third-Party Applications Can Have Vulnerabilities Too (veracode.com) |
|
2 points by anand-s on June 25, 2015 | past
|
| | What Is the State of Software Security in 2015? (veracode.com) |
|
1 point by anand-s on June 24, 2015 | past
|
| | Golang's Context Aware HTML Templates (2013) (veracode.com) |
|
4 points by StandardFuture on Nov 10, 2014 | past
|
| | Misfeatures Strike Again (veracode.com) |
|
1 point by luu on Sept 26, 2014 | past
|
| | Executable Archaeology: The Case Of The Stupid Thing Eating All My RAM (veracode.com) |
|
2 points by luu on May 16, 2014 | past
|
| | Introducing the iOS Reverse Engineering Toolkit (veracode.com) |
|
2 points by adamnemecek on March 21, 2014 | past
|
| | Introducing the iOS Reverse Engineering Toolkit (veracode.com) |
|
3 points by symmetricality on March 20, 2014 | past
|
| | Guidelines for Setting HTTP Security Headers (veracode.com) |
|
1 point by caf on March 17, 2014 | past
|
|
|
More |