Remove tag owasp
article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. We conclude with a demo of an open source DAST tool called OWASP ZAP by using it against our own vulnerable web application. You can download Docker here.

article thumbnail

How to make your web application more secure by using Interactive Application Security Testing (IAST) – PART 3 of Application Security Testing series

Xebia

Introduction Welcome to part three of the blog series about Application Security Testing. In this blog we are going to learn about Interactive Application Security Testing (IAST). We will look at their SCA solution in a later blog. The library findings will be discussed in the next blog. Click on “Vulnerabilities”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: New Guide Explains How To Assess If Software Is Secure by Design, While NIST Publishes GenAI Risk Framework

Tenable

These are some of the tactics, techniques and procedures MITRE observed during the breach: In the blog “ Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion, MITRE added more details, such as: The attackers initially accessed NERVE by deploying the ROOTROT webshell on an external-facing Ivanti appliance. What does it take?

article thumbnail

Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows

Prisma Clud

As we discussed in the previous blog post, Third-Party GitHub Actions: Effects of an Opt-Out Permission Model , the permissive nature of GitHub Actions workflows is prevalent throughout the open-source community and private projects on GitHub. Figure 3: Pyupio/safety’s action.yaml file pulls a mutable image with the ‘latest’ tag.

article thumbnail

Strengthening the Nessus Software Supply Chain with SLSA

Tenable

But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cyberattacks – and that’s what this blog is about. Our SBOM is in the OWASP CycloneDX format. It also includes all the parameters used and the configuration steps’ output.

article thumbnail

Cybersecurity Snapshot: What, Me Worry? Businesses Adopt Generative AI, Security Risks Be Damned

Tenable

The Tenable Security Response Team covered the advisory in-depth in its blog “ AA23-215A: 2022's Top Routinely Exploited Vulnerabilities. ” That’s the main finding from IBM’s “Cost of a Data Breach Report 2023,” which pegged the price tag at a global average of $4.45 Check out the aptly titled blog “What is a Zero Trust Architecture?”

article thumbnail

Identifying Server Side Request Forgery: How Tenable.io Web Application Scanning Can Help

Tenable

SSRF flaws have become so commonplace that they’re now part of the Open Web Application Security Project ( OWASP) TOP 10 for 2021. The final attack scenario we will cover for this blog post is the use of the “gopher://” wrapper, which is particularly interesting in the case of a blind SSRF. What is a server-side request forgery?