| | We Asked 100 AI Models to Write Code (veracode.com) |
| 3 points by ygritte 5 months ago | past | 1 comment |
|
| | GenAI Code Security Report [pdf] (veracode.com) |
| 3 points by _tk_ 5 months ago | past |
|
| | Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2 (veracode.com) |
| 3 points by gnabgib 7 months ago | past |
|
| | Exploiting JNDI Injections in Java (2019) (veracode.com) |
| 2 points by crummy on Dec 17, 2021 | past |
|
| | State of Software Security: open-source Edition (veracode.com) |
| 26 points by giuliomagnifico on June 27, 2021 | past | 5 comments |
|
| | How to Set Up Veracode in a Large Azure Project (veracode.com) |
| 1 point by bramkrom on April 23, 2021 | past |
|
| | Top Security Anti-Patterns in Asp.net Core Applications (veracode.com) |
| 2 points by relaxnow on March 2, 2021 | past |
|
| | Secure Coding Challenge at Veracode (veracode.com) |
| 5 points by jalane81 on Jan 11, 2021 | past |
|
| | State of Software Security Flaw Frequency by Language [pdf] (veracode.com) |
| 8 points by adityatelange on Dec 25, 2020 | past | 1 comment |
|
| | State of Software Security for 2020 (veracode.com) |
| 1 point by pjmlp on Dec 22, 2020 | past |
|
| | Write code that protects sensitive user data (veracode.com) |
| 1 point by jalane81 on Sept 17, 2020 | past |
|
| | Veracode Launches Free Community Edition of Security Labs for Developers (veracode.com) |
| 2 points by jalane81 on Aug 4, 2020 | past |
|
| | State of Software Security: open-source Edition (veracode.com) |
| 1 point by based2 on May 21, 2020 | past | 1 comment |
|
| | ISO: Principal Java Developer for New Product (veracode.com) |
| 2 points by lgagnon on Feb 4, 2019 | past |
|
| | Exploiting JNDI Injections in Java (veracode.com) |
| 1 point by based2 on Jan 3, 2019 | past |
|
| | SourceClear acquired by Veracode (veracode.com) |
| 1 point by tensor on June 13, 2018 | past |
|
| | How a Single Phone Call Can Compromise Your Company (veracode.com) |
| 3 points by Neostrategos on Sept 13, 2017 | past |
|
| | Anatomy of a Cross-Site Scripting Flaw in the Telerik Reporting Module (veracode.com) |
| 1 point by relaxnow on June 6, 2017 | past |
|
| | Encryption and Decryption in Java Cryptography (veracode.com) |
| 1 point by Neostrategos on April 19, 2017 | past |
|
| | Cryptographically Secure Pseudo-Random Number Generator (CSPRNG) (veracode.com) |
| 3 points by Neostrategos on March 29, 2017 | past |
|
| | Supporting software that spans over 50 years of history (veracode.com) |
| 2 points by Neostrategos on Oct 5, 2016 | past |
|
| | Why DevOps Is Not DevSecOps (veracode.com) |
| 1 point by DrinkWater on Sept 1, 2016 | past |
|
| | A developer’s perspective on last minute security requirements (veracode.com) |
| 1 point by Neostrategos on Feb 3, 2016 | past |
|
| | 3 Easy Steps to Making Perfect Security Possible (veracode.com) |
| 1 point by Neostrategos on Oct 27, 2015 | past |
|
| | AngularJS Expression Security Internals (veracode.com) |
| 3 points by sprkyco on June 25, 2015 | past |
|
| | Popular Third-Party Applications Can Have Vulnerabilities Too (veracode.com) |
| 2 points by anand-s on June 25, 2015 | past |
|
| | What Is the State of Software Security in 2015? (veracode.com) |
| 1 point by anand-s on June 24, 2015 | past |
|
| | Golang's Context Aware HTML Templates (2013) (veracode.com) |
| 4 points by StandardFuture on Nov 10, 2014 | past |
|
| | Misfeatures Strike Again (veracode.com) |
| 1 point by luu on Sept 26, 2014 | past |
|
| | Executable Archaeology: The Case Of The Stupid Thing Eating All My RAM (veracode.com) |
| 2 points by luu on May 16, 2014 | past |
|
|
| More |