AppSec & DevSecOps insights · 175 posts
🛠 Attack vectors of the TRACE method Salute, I often ask the guys I meet who know how to use DAST and have at least to…
Read →
🛠 k8s Secure Network Policy Salute, I decided to share a useful resource about network security policies as a continua…
Read →
🛠 Cilium CNI Secure Profile Salute, I previously described here what CNI is, and I also talked about Cilium with examp…
Read →
🛠Vulnerable MCP Servers Lab A little stolen, but worth sharing, I think you'll like it. Follow the link with 9 labs fr…
Read →
🛠 Semgrep Rules OWASP A03:2024 – Injection (SQL/OS/Expression) Salute, Today I want to share with you the rules for s…
Read →
A little meme, vital for all of us under 22% VAT. #lol
Read →
🤔 Search for vulnerabilities in software during exploitation Today I listened to a cool webinar with Artem Khramykh fr…
Read →
🛠 Checkov SAST profile I started rebuilding custom profiles, and I wanted to share with you an example for checkov tha…
Read →
🏆 DevSecOps Award for the Russian FinTech market Salute, Today I want to start with you with an official review of th…
Read →
🛠 Checkov SAST for IAC Salute, Let's continue to look further towards instruments and today we will talk about Anton …
Read →Channel photo updated
Read →
🛠 Non-trivial Reco for networking and repository management Today I want to continue the previous topic and share with…
Read →
Fireworks, I can’t resist, so pay attention to your profile 😅🤣 hello to those involved #lol
Read →
🛠 Non-trivial Reco in software development Salute, Today I want to share with you the specific information security re…
Read →
🤔 Benchmark InfoSec Risks Salut, you and I once looked at a case on information security risks here, and now I think i…
Read →