Secure coding


13 articles

Secure Coding

All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

Secure Coding

All eyes on APIs: Top 3 API security risks and how to mitigate them

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

Phil Muncaster01 Jun 2023


Secure Coding

Cracked it! Highlights from KringleCon 5: Golden Rings

Cracked it! Highlights from KringleCon 5: Golden Rings

Secure Coding

Cracked it! Highlights from KringleCon 5: Golden Rings

Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings

Rene Holt09 Jan 2023


Secure Coding

Integer overflow: How does it occur and how can it be prevented?

Integer overflow: How does it occur and how can it be prevented?

Secure Coding

Integer overflow: How does it occur and how can it be prevented?

Make no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.

Rene Holt21 Feb 2022


Secure Coding

What are buffer overflow attacks and how are they thwarted?

What are buffer overflow attacks and how are they thwarted?

Secure Coding

What are buffer overflow attacks and how are they thwarted?

Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities

Rene Holt06 Dec 2021


Secure Coding

IT forensic tools: How to find the right one for each incident

IT forensic tools: How to find the right one for each incident

Secure Coding

IT forensic tools: How to find the right one for each incident

Some online resources that will help you find the most suitable IT forensic tools for each case

Lucas Paus03 Oct 2018


Secure Coding

Programmer's Day: Resources to audit your code

Programmer's Day: Resources to audit your code

Secure Coding

Programmer's Day: Resources to audit your code

Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code

Cecilia Pastorino13 Sep 2018


Secure Coding

Can cramming code with bugs make it more secure? Some think so

Can cramming code with bugs make it more secure? Some think so

Secure Coding

Can cramming code with bugs make it more secure? Some think so

Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable

Tomáš Foltýn13 Aug 2018


Secure Coding

Five tips for pentesters in iOS

Five tips for pentesters in iOS

Secure Coding

Five tips for pentesters in iOS

Recommendations for pentesters looking for security flaws in iOS applications made by developers

Denise Giusto Bilić05 Jul 2018


Secure Coding

Open source code is ubiquitous and so are many vulnerabilities

Open source code is ubiquitous and so are many vulnerabilities

Secure Coding

Open source code is ubiquitous and so are many vulnerabilities

One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago

Tomáš Foltýn18 May 2018