secure coding

25 Results / Page 3 of 3

web application are vulnerable

todayJune 6, 2021

close

blog + secure coding Z. Oualid

Why are web applications vulnerable?

Web application technology is one of the most popular and rising types of software used by companies in their daily business life. In addition, it is the most exposed surface for the public. In the last decade, most people have started noticing an increase in security threats affecting this technology, ...

SQL injection attack

todayJune 3, 2021

close

blog + secure coding Z. Oualid

Does SQL injection still work 2021?

Every time I do a course about penetration testing or secure coding, the most common question I get from my student is for example, Does SQL injection still work 2021? SQL injection still works in 2021 and it will probably still working at least for the next 5 years. In ...

devsecops

todayMay 28, 2021

close

blog + secure coding + DevSecOps Z. Oualid

Pros and cons of Devsecops

In the last few years, I have worked with some companies in the market to implement security in their DevOps system, and it was really a good experience that let me understand what really works and what doesn’t in a DevSecOps environment. Here is a table that summaries the pros ...

Directory path traversal VS file inclusion vulnerabilities

todayMay 19, 2021

close

blog + secure coding Z. Oualid

Directory path traversal VS file inclusion vulnerabilities

For many years, one of the most confusing vulnerabilities for both security professionals and clients in the industry is the Directory path traversal and the file inclusion (LFI/RFI). So what is the difference between these two vulnerabilities? The main difference between a Directory path traversal and the file inclusion vulnerabilities ...

first vulnerability to start with

todayMay 8, 2021

close

blog + secure coding Z. Oualid

Vulnerabilities you should prioritize while fixing

Every time I give my penetration test report to my client to start fixing their vulnerabilities, the first question they ask, is which one we should prioritize in our fixing plan? Here are five types of vulnerabilities that need to be prioritized while fixing the discovered ones, ordered by criticality: ...