DefenseCode Security Blog
Monday, April 23, 2018
Application Security Testing (the Wild West perspective)
›
Imagine running a bank in a small town. A small town in the Old Wild West. Gangs roam freely. Many people are poor and desperate. Law and en...
436 comments:
Tuesday, July 11, 2017
Multiple Buffer Overflow Vulnerabilities in IBM Database software (DB2 and Informix)
›
Hi Dear Reader, During the last couple of weeks we have published security vulnerabilities in database tools related to DB2 and Informix d...
161 comments:
Tuesday, June 6, 2017
ThunderScan Discovered Multiple Vulnerabilities in Google API Client Library for PHP
›
Hi, During the security audit of Google APIs Client Library for PHP multiple XSS vulnerabilities were discovered using DefenseCode Thunder...
177 comments:
DefenseCode Is Looking for New Partners and Resellers
›
In order to additionally expand its rapid growth, DefenseCode L.L.C is currently looking to expand our world-wide partners and resellers for...
175 comments:
Stealing Windows Credentials Using Google Chrome
›
Hi, Check out our new whitepaper about stealing Windows credentials using the most popular browser today - Google Chrome. URL: http://w...
129 comments:
Wednesday, April 12, 2017
High Risk 0-day Vulnerability Found in Magento eCommerce
›
During the security audit of Magento Community Edition, a highly popular e-commerce platform, a high risk vulnerability was discovered th...
287 comments:
Monday, April 10, 2017
Apache Tomcat Vulnerabilities Found Using DefenseCode ThunderScan SAST
›
During the source code security analysis of Apache Tomcat with DefenseCode ThunderScan SAST solution, two different security issues wer...
226 comments:
›
Home
View web version