Susanoo is a security tool to test web applications and find vulnerabilities related to command injection attacks.

It can be used during security assignments https://t.co/H1y5EI93Du ...

Continue Reading
I’m not going to use this for a while.

I bought the Bose QC35 II headphones, and I love them. They sound great, they are comfortable enough that I can wear them all day with no discomfort, and they have noise cancelling which is fantastic ...

Continue Reading
Apigee is a proxy layer that can secure and protect your backend APIs with its out-of -box capabilities.

Google Cloud Armor provides web application firewall (WAF) capabilities and helps to prevent distributed denial of service (DDoS) attacks. It can also help you to mitigate the threat to applications f ...

Continue Reading
Use Apigee as a proxy layer to secure your APIs.

Use Google Cloud Armor as a WAF layer along with Apigee. Use reCAPTCHA Enterprise for securing your web applications and APIs. Use Cloud CDN for caching of static content, images, videos, etc., across ...

Continue Reading
Moesif is hiring! We are looking for a Senior Software Engineer to join our team.

Moesif makes API analytics easy and actionable with its machine-learning based platform that helps developers monitor, troubleshoot, and secure their APIs. Moesif’s customers include some of the larg ...

Continue Reading
I’m a software engineer with an interest in human-computer interaction, and I’ve been working on a project to help people learn how to program.

It's called CodeCombat, and it's available now! I was inspired by my own experience learning programming. I started out as a kid playing around with BASIC on my dad's old PCjr (which had no graphics ...

Continue Reading
If you’re looking for a good, cheap, and easy way to get into the game of disc golf (aka Frisbee golf), this is it.

I love playing disc golf. It’s one of my favorite things to do with friends on a nice day. I also like that it doesn’t require much in the way of equipment or skill; anyone can pick up a frisbee and ...

Continue Reading
Don’t use access tokens for authentication.

API #3: Excessive Data Exposure The third vulnerability is excessive data exposure, which happens when an API exposes too much information about users or resources. This can be a big problem because ...

Continue Reading

Back to Main

Subscribe for the latest news: