DefenseCode

DefenseCode Security Blog

Monday, April 23, 2018

Application Security Testing (the Wild West perspective)

›
Imagine running a bank in a small town. A small town in the Old Wild West. Gangs roam freely. Many people are poor and desperate. Law and en...
436 comments:
Tuesday, July 11, 2017

Multiple Buffer Overflow Vulnerabilities in IBM Database software (DB2 and Informix)

›
Hi Dear Reader, During the last couple of weeks we have published security vulnerabilities in database tools related to DB2 and Informix d...
161 comments:
Tuesday, June 6, 2017

ThunderScan Discovered Multiple Vulnerabilities in Google API Client Library for PHP

›
Hi, During the security audit of Google APIs Client Library for PHP multiple XSS vulnerabilities were discovered using DefenseCode Thunder...
177 comments:

DefenseCode Is Looking for New Partners and Resellers

›
In order to additionally expand its rapid growth, DefenseCode L.L.C is currently looking to expand our world-wide partners and resellers for...
175 comments:

Stealing Windows Credentials Using Google Chrome

›
Hi, Check out our new whitepaper about stealing Windows credentials using the most popular browser today - Google Chrome. URL: http://w...
129 comments:
Wednesday, April 12, 2017

High Risk 0-day Vulnerability Found in Magento eCommerce

›
During the security audit of Magento Community Edition, a highly popular e-commerce platform, a high risk vulnerability was discovered th...
287 comments:
Monday, April 10, 2017

Apache Tomcat Vulnerabilities Found Using DefenseCode ThunderScan SAST

›
During the source code security analysis of  Apache Tomcat  with  DefenseCode ThunderScan  SAST solution, two different security issues wer...
226 comments:
›
Home
View web version

Contributors

  • Bosko
  • DefenseCode
  • Unknown
Powered by Blogger.