Aug 25 2021

How to Reduce Risk with Runtime Application Self Protection

Category: App Security,Information SecurityDISC @ 1:03 pm

Instead of waning, cyber attacks continue to rise as the years pass. Several reasons contribute to this phenomenon, despite developing and deploying more robust network and data security platforms. First, the recent spate of disruptive cyberattacks hampering operations of organizations and government agencies proves that cybercriminals are becoming bolder in perpetuating their malicious activities.

These nefarious actors attack small, medium, and large corporations and organizations. Several attacks were publicized. Most of them are high-profile ransomware victims: Kaseya, JBS, SolarWinds, Colonial Pipeline, Acer, AXA, and CAN Financial. Many of them opted to pay the ransom demand not to disrupt operations that can affect thousands of businesses and consumers.

The nagging question is why cyberattacks are happening more often today. First, attackers are getting more sophisticated. Second, many are organized hacking groups, while some areĀ already identified as government-backed hackers. The increase in cyberattacks can be attributed to several reasons, namely:

  • The willingness of many victims to pay the ransom;
  • Increased use of unregulated cryptocurrencies, which are harder to trace;
  • Publication of cyberattacks enticed other hackers to try the activity themselves, taking the publication of the attacks as successes of cybercriminalsā€“Ā this turned into a get-rich-quick scheme;
  • Increasing numbers of people going online, especially amid the pandemic.

Table of Contents

Alice and Bob Learn Application Security

Tags: Runtime Application


Aug 18 2021

Adopting Zero-Trust for API Security

Category: Access Control,App Security,Zero trustDISC @ 11:56 am

Why Use Zero-Trust for API Security

Think of APIs as the new network; interconnected in complex ways and with API interactions happening both within and outside  of the organization.

ā€œPublic-facing APIsā€”for example, consumer bankingā€”are usually a key area of focus when it comes to zero-trust,ā€ said Dunne. ā€œThis is due to the obvious risk exposure when APIs are documented and made available on the public internet.ā€

However, the larger risk is found in private and internal APIs, because there is a common assumption that since they arenā€™t documented or found on a public network, they arenā€™t exposed.

But as threat actors become more sophisticated in their search for and discovery of private APIs, there is increased risk of the bad guys gaining access to massive amounts of sensitive data. Private APIs need the same layers of protection as public-facing APIs.

ā€œAPIs are, by definition, atomic in natureā€”meaning they can be invoked independently,ā€ explained Setu Kulkarni, vice president, strategy at NTT Application Security in an email interview. ā€œThat creates a real challenge for securing these APIs.ā€

Given that, Kulkarni added, a critical consideration for implementing zero-trust in APIs is to ensure that there is appropriate access control built into the API implementation. Every API function call requires not just authentication but also authorization. Also, adding zero-trust around session validation helps to prevent unintended data leakage.

Integrating Zero-Trust in APIs

API Security in Action

Tags: API Security


Aug 13 2021

Google open-sourced Allstar tool to secure GitHub repositories

Category: App Security,File Security,Security ToolsDISC @ 10:02 am

Google has open-sourced the Allstar tool that can be used to secure GitHub projects and prevent security misconfigurations.

Google has open-sourced the Allstar tool that can be used to secure GitHub projects by enforcing a set of security policies to prevent misconfiguration.

ā€œAllstar is a GitHub App installed on organizations or repositories to set and enforce security policies. Its goal is to be able to continuously monitor and detect any GitHub setting or repository file contents that may be risky or do not follow security best practices.ā€ reads theĀ project description. ā€œIf Allstar finds a repository to be out of compliance, it will take an action such as create an issue or restore security settings.ā€

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Tags: Open source


Aug 07 2021

The RedMonk Programming Language Rankings

The RedMonk Programming Language Rankings: June 2021

This iteration of the RedMonk Programming Languages is brought to you by Microsoft. Developers build the future. Microsoft supports you in any language and Java is no exception; we love it. We offer the best Java dev tools, infrastructure, and modern framework support. Modernize yourĀ Java development with Microsoft.

While we generally try to have our rankings in July immediately after they are run, we generally operate these on a better late than never basis. On the assumption, then, that August is better than never, below are your RedMonk Q3 language rankings.

As always, these are a continuation of the work originally performed by Drew Conway and John Myles White late inĀ 2010. While the specific means of collection has changed, the basic process remains the same: we extract language rankings from GitHub and Stack Overflow, and combine them for a ranking that attempts to reflect both code (GitHub) and discussion (Stack Overflow) traction. The idea is not to offer a statistically valid representation of current usage, but rather to correlate language discussion and usage in an effort to extract insights into potential future adoption trends.

Our Current Process

The data source used for the GitHub portion of the analysis is the GitHub Archive. We query languages by pull request in a manner similar to the one GitHub used to assemble the State of the Octoverse. Our query is designed to be as comparable as possible to the previous process.

  • Language is based on the base repository language. While this continues to have the caveats outlined below, it does have the benefit of cohesion with our previous methodology.
  • We exclude forked repos.
  • We use the aggregated history to determine ranking (though based on the table structure changes this can no longer be accomplished via a single query.)

For Stack Overflow, we simply collect the required metrics using their useful data explorer tool.

With that description out of the way, please keep in mind the other usual caveats.

Java Script

Tags: Programming Language


Jul 12 2021

APPSEC TESTING APPROACHES

Category: App Security,Pen TestDISC @ 1:59 pm

AppSec testing Approach CheatSheet pdf download

5 Things a Pen Tester Looks for When Evaluating an Application

PenTest as a Service

Pentest as a Service Platform

The Web Application Hacker’s Handbook

Tags: #PenTest, AppSec, DevSecOps, PentestasaService


Jun 29 2021

4 Warning Signs of an Insecure App

Category: App SecurityDISC @ 10:05 am

The ā€œgolden age of digital transformationā€ is upon us, and companies around the globe are scurrying to meet consumers on the digital frontier. For developers, it is a virtual gold rush, as businesses overhaul their infrastructure to meet consumers where they areā€”their mobile phones. For most, this means developing a mobile app.

Unfortunately, the byproduct of the scramble to build a mobile app is that essential features are often overlooked or omitted entirely. There are many things that can be missed when creating an app (like network tolerance and accessibility)ā€“but confoundingly, the feature thatā€™s most often forgotten is the most important: app security.

Data use and privacy are top-of-mind for users. It is vital that software developers donā€™t cut corners when it comes to securing a mobile app. A secure app should pass the coffee table test: Would I be comfortable going to the bathroom and leaving my phone on a public coffee table?

Itā€™s no secret that app security is a hot topic, but what are the actual warning signs of an insecure app?

Tags: Application security, Insecure App


May 20 2021

Hiring remote software developers: How to spot the cheaters

Category: App SecurityDISC @ 10:11 am

How are software development applicants cheating?

Prior to COVID-19, many companies had engineering applicants take coding skills assessments in person. On-premises testing allowed employers to control the environment and observe the applicantā€™s process. Now, employers are providing these assessments (and getting observations) remotely, and applicants (almost exclusively at the junior level) are gaming the platforms.

The two most common strategies are plagiarism and identity misrepresentation. In the former, applicants copy and paste code found on sites like Github or they are lifting code from prior assessments administered by the same employer that have been published and/or sold online. (Companies that have only a few variations of a coding challenge will find, with a quick Google search, that prior test-takers have either posted it online or are offering the answers privately. Theyā€™ll even sprinkle in some minor differentiations so that itā€™s harder to catch.) Identity misrepresentation means asking or paying someone else to log in to the test platform and solve the test (or part of it) for the applicant.

Globally, the rate for plagiarism in 2020 was 5.6%, and suspicious connectivity patterns ā€“ indicative of session handover to someone else other than the applicant ā€“ appear in 6.48% of sessions. We are seeing a slight growth in the percent of sessions with suspicious behaviors, and this growth is visible in both global and financial markets in particular.

Some industries will have higher rates of cheating than others; for example, organizations in the government, education, and non-profit sectors can see up to double the global average for red-flag behavior. The general shortage of HR professionals with deep technical knowledge make practically all employers vulnerable to inefficiencies and the perils of under-qualified tech candidates making it too far into the recruitment funnel. Higher rates of cheating mean that IT professionals need smarter tools to avoid mis-hires.

Addressing this problem needs to be a priority for employers looking to hire remotely on a larger scale or as a permanent practice, because the short- and long-term consequences are always more costly than whatever investments they put into preventative safeguards.

Hiring a person who cheated in the recruitment process is a recipe for disaster, both for the employer and the employee. Job seekers will typically cheat because they lack the qualifications to pass the recruitment process or, sometimes, just lack the confidence that they can succeed. In either case, if the recruitment leads to employment, the nascent working relationship is botched from day one. The lack of qualifications surfaces sooner or later, frequently damaging schedules, reliability, and security of software products and services, not to mention driving business costs up and reputation down.

More alarmingly, common sense and academic research suggest (Peterson et al., 2011; Schneider & Goffin, 2012), says that the lack of integrity has a potential to reoccur on the job, quite possibly leading to security breaches immensely more dangerous than software bugs. Last but not least, it is plainly emotionally difficult for many individuals to grow a healthy relationship towards the employer and the workplace when the relationship started with dishonesty.

Don't Hire a Software Developer Until You Read this Book: The software survival guide for tech startups & entrepreneurs (from idea, to build, to product launch and everything in between.) by [K.N. Kukoyi]

Tags: DevSecOps


May 16 2021

DevOps didnā€™t kill WAF, because WAF will never truly die

Category: App Security,next generation firewallDISC @ 9:21 pm

You can only get rid of WAF if you fully implement security into your development process and audit the process via code reviews and annual tests. But DevSecOps canā€™t be realistically implemented for all web apps in the enterprise environment, so WAF will stick around because it still has a job to do.

The WAF is not dead, whatā€™s left?

DevOps and the continuous integration and continuous deployment (CI/CD) pipeline provide an excellent opportunity to implement security, especially if your agile methodology includes security sprints. It allows for security to be built into the apps from the start, rather than taking the traditional route of applying it later, which is not only inefficient but ā€“ in the frenetic pace of CI/CD ā€“ can be overlooked, ignored, or forgotten.

Although security for all web apps should be built-in from the start, our experience shows that it is usually only applied to the ā€œcrown jewels,ā€ like the companyā€™s primary customer portal or client payment systems. In an enterprise environment, itā€™s not unusual for a company to be running old apps in which code is no longer maintained or apps integrated through acquisition.

Additionally, departments such as R&D and marketing frequently implement custom or third-party applications. This app proliferation can result in more than 50% of public-facing web applications in an organization being managed by DevOps or other disparate IT groups. These apps will need additional mitigation controls, which is where WAF comes in.

Tags: DevOps, SecDevOps


Apr 23 2021

Privacy and security in the software designing

Category: App Security,Information PrivacyDISC @ 9:49 pm

The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information and the data privacy.

In order to reduce as much as possible the vulnerabilities and programming errors that can affect not only the quality of the product itself but can also be exploited to launch increasingly sophisticated and growing computer attacks, itā€™s necessary to guarantee the protection parameters of computer security in terms of integrity, confidentiality and authentication both for the code of an application and for data management. Therefore, itā€™s essential to carry out a careful risk and impact assessment in order to safeguard the security of the information and the data privacy.

The project must be planned, following a common denominator for the whole software life cycle, to ensure the security requirements for the data, functions and programming language.

The reference model used in this discussion is, for simplicityā€™s sake, sequential, in which only after completing one phase does one move on to the next. However, it could be envisaged, for greater efficiency and flexibility, to revise and correct the various phases:

  • requirements study and analysis;
  • designing;
  • implementation and system check;
  • distribution and maintenance.


Apr 23 2021

Outpost24 report finds Top 10 US Credit Unions all have web application issues

Category: App Security,Web SecurityDISC @ 9:12 am


Apr 20 2021

Web Application Securityā€™s Lost Year

Category: App Security,Web SecurityDISC @ 1:15 pm

Web Application Security More Critical Than Ever

Other findings from the report include:

  • An overall prevalence of high-severity vulnerabilities such as remote code execution, SQL injection, and cross-site scripting;
  • Medium-severity vulnerabilities such as denial-of-service, host header injection and directory listing, remained present in 63% of web apps in 2020;
  • Several high-severity vulnerabilities did not show improvement in 2020 despite being well understood, such as the incidence of remote code execution, which increased by one percentage point last year.

COVID-19 pushed organizations and consumers to an even greater reliance on web applications. As organizations depend on web applications ā€“ ranging from web conferencing and collaboration environments to e-commerce sites ā€“ to handle what were once in-person tasks, web application security has become even more critical than ever. And thatā€™s what makes a lost year of web application security so troublesome.

Web attacks reached new highs during the pandemic, according to Interpol, and that puts the security of companies at greater risk.

ā€œItā€™s very troubling to see this loss of momentum due to reduced attention to web application security,ā€ said Invicti president and COO Mark Ralls in a formal statement. ā€œAs we look ahead, we hope to see organizations adopt best practices and invest in security, so that they can continue to advance their web security posture, protect their customers, and avoid being the next big security breach headline.ā€


Apr 20 2021

Digital business requires a security-first mindset

Category: App Security,Information SecurityDISC @ 9:01 am

Digital business mindset

While developing a seamless and successful digital mindset with a security strategy is not a simple task, the effort is crucial for the health of a company. Unfortunately, security tools havenā€™t always gotten the best rep with developers, who feared the tools would slow them down, reflect poorly on their work, or even cost them their job if something were to go wrong. For example, static application security tools (SAST) often yield false positives requiring significant resources to remediate.

Since remediation advice is often generic, in some cases, developers wind up spending an extensive amount of time reading through lengthy documentation to understand the right fix. So how can organizations create a security-first culture despite these barriers?

Digital business requires a security-first mindset

Tags: security-first mindset


Apr 05 2021

Securing Dev Environments is Security Leadersā€™ Top Concern

Category: App SecurityDISC @ 12:27 pm

Tags: DevOps, SecDevOps


Apr 03 2021

Applications Are Everything and Everywhere ā€“ Does Whack-a-Mole Security Work?

Category: App SecurityDISC @ 10:53 pm

The SolarWinds digital supply chain attackĀ began by compromising the ā€œheartā€ of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations face in securing their applications across the software development lifecycle and is driving increased attention at the highest levels of enterprise and government. In fact,Ā ReutersĀ recently reported that the Biden administration is preparing an executive order outlining new software security and breach disclosure requirements.

As organizations look to strengthen their digital supply chain and protect the applications they develop and use, many are focusing on application secrets ā€“ which are ripe targets for attackers and can provide unrestricted privileged access to sensitive systems.

Cloud-Native Apps Expand Security Needs

Today, many organizations are taking a cloud-native approach to building, testing and deploying new applications ā€“ whether front- or back-office, consumer-facing, web or mobile. And by embracing DevOps methodologies and automation, theyā€™re quickly moving along the digital maturity curve.

As applications are increasingly built using microservices and run in dynamic, short-lived containerized environments, everything needs to interact with each other ā€“ sharing secrets and credentials to securely access resources. The result: a lot more secrets that need to be secured.

Whatā€™s more, the powerful DevOps and automation tools developers use such as Jenkins and Ansible to build applications store massive amounts of credentials and secrets within them. This allows the projects, playbooks and scripts managed by these mission-critical ā€œTier 0ā€ assets to access other tools, services and platforms. All of these tools also require high levels of privilege.


Apr 02 2021

The growing threat to CI/CD pipelines

Category: App Security,Cloud computingDISC @ 10:01 am

Today, rapid digitalization has placed a significant burden on software developers supporting remote business operations. Developers are facing continuous pressure to push out software at high velocity. As a result, security is continuously overlooked, as it doesnā€™t fit into existing development workflows.

The way we build software is increasingly automated and integrated. CI/CD pipelines have become the backbone of modern DevOps environments and a crucial component of most software companiesā€™ operations. CI/CD has the ability to automate secure software development with scheduled updates and built-in security checks.

Developers can build code, run tests, and deploy new versions of software swiftly and securely. While this approach is efficient, major data breaches have demonstrated a significant and growing risk to the CI/CD pipeline in recent months.

The growing threat to CI/CD pipelines

Pipeline as CodeĀ is a practical guide to automating your development pipeline in a cloud-native, service-driven world.

Tags: CI/CD pipelines, Pipeline as Code


Apr 01 2021

Building Immunity at AppSec Insertion Points

Category: App SecurityDISC @ 10:45 pm

The fundamentals of a formal, effective application security plan should start with business objectives, tools, processes and most of all, data, with the primary driver for securing applications focused on protecting data.

While it is important to surgically address the insecurities in a mission-critical application, it is equally important to continuously upskill the development and security teams, and create a culture where security is not looked at simply a ā€˜check-the-boxā€™ item.

According to Setu Kulkarni, vice president of strategy at WhiteHat Security, the first step is to identify the right inflection points for injecting application security.

ā€œCISOs need to recognize that no SDLC is built the same and no application is at the same level of maturity within its life cycle,ā€ he said. ā€œWe have learned that testing applications continuously in production is critical to identify the real, exploitable vulnerabilities that create the maximum risk of being breached in production.ā€

Kulkarni noted one way to (almost always) ensure that security does not become an afterthought is to ā€œtop & tailā€ ā€“ in other words, make sure that your team gets a voice when the exit criteria is being defined during the requirements phase, and make sure the team is testing in pre-production and production.

ā€œEverything in between is really a negotiation based on the maturity of the SDLC and the application itself. The most consequential best practice is to ensure that the Dev, Sec and Ops teams get accurate and actionable insight from the AppSec tests that are executed,ā€ he said. ā€œAfter all, the only way to eventually have security operate at the speed of DevOps is through some level of automation, and the efficacy of automation is directly proportional to the accuracy of the data used to drive the automation.ā€

Doug Dooley, COO of Data Theorem, pointed out that the business driver for AppSec is about privacy, trust and reputation that is directly tied to the brand of those who build and publish the applications.

He noted traditional AppSec testing focused on static and dynamic application security testing, including static application security testing (SAST) and dynamic application security training (DAST).

ā€œHowever, with a more modern application stack, AppSec programs are starting to factor in third-party risks introduced by open source and software development kits, covered by software composition analysis,ā€ Dooley explained.

Further, cloud-native applications make infrastructure services just another software extension of the application buildout, so many AppSec programs increasingly add cloud security tools, such as cloud security posture management (CSPM).


Mar 29 2021

DevSecOps as a culture ā€“ What you need to know

Category: App SecurityDISC @ 10:37 pm

DEVSECOPS

Enough about culture and on to DevSecOps. What kind of culture allows it to thrive?

  1. An important aspect is having a better understanding of the motivators of and detractors in each element. I wonā€™t review those here because they are covered well in this article:Ā https://www.stackrox.com/post/2021/02/devops-vs-devsecops-heres-how-they-fit-together/Ā But I will say that this topic brings to mind the Stephen Covey quote, ā€œSeek first to understand, then to be understood.ā€
  2. Another cultural aspect is that the model requires people to ā€œfail fast.ā€ Failure must be allowed. Itā€™s not the kind of failure that leads to company ruin, though it may might be personally embarrassing. You know that main network cable that leads to your office, the one with the sign ā€œDo not unplug!ā€? Iā€™m the guy who accidentally unplugged it. Iā€™m also the guy who returned a laptop without an RMA: it got lost on the return trip, so we never got our money back. Iā€™m the one who worded something poorly in a policy and was glad that someone caught it before it went out. People make mistakes. The allowance of failure will actually lead to encouraging people to fail, born out of the idea that the more they do, the more theyā€™ll fail AND succeed.
  3. The culture also has to engender the attitude of ā€œa failure is an event, not a person.ā€ As I referenced earlier ā€“ weā€™re not talking about allowing failures that destroy companies and reputations; Iā€™m talking about failures such as ā€œOops! I deleted that section of code because I didnā€™t think it was needed. Iā€™ll get it back ASAP.ā€

This kind of culture leads, not to diminishing returns, but to cohesion in the team and growth in technical acumen. Do those failures get pointed out and documented? Of course ā€“ the team doesnā€™t really want to spend another 4 hours on another night correcting the same mistake. The person doesnā€™t get called out, but the failure gets pointed out.

  1. The collaborators must be able to expose a vulnerability, have it prioritised, and get it fixed. No naming and shaming, because the goal is not a personā€™s desire never to fail, but to provide a secure and well-working product.

DevSecOps culture also lends itself to letting those doing the work determine what works best for them, which empowers them to be better professionals. Over time, the team notices patterns in failures and successes, and knows best what product or service would overcome those failures and automate successes.

  1. There needs to be ample maker time, so DevSecOps needs to be free from an interrupt-driven culture. Thereā€™s a creative aspect to DevSecOps that requires time to think. Anyone in the arts knows that about the sliding scale of concentration (though they may not call it that). On one end is complete focus on a task, but this extreme focus removes the emotional element. On the other end is the emotional scale, but this extreme leaves out the technical part. Toward the middle is the proper mindset, where thereā€™s a free-thinking and open sensitivity required for being creative, in addition to keeping the boundaries of the techniques and protocols, provided by business requirements, customer demand, etc.

Perhaps you arenā€™t currently part of a corporate culture for proper DevSecOps to thrive, for whatever reason (e.g., current management attitude, a change in leadership). You could work on creating a subculture. You might have a co-worker with whom you can work to make improvements while not negatively impacting the current speed of production. Or you have some leeway to introduce a tool that can help slightly.

  1. Technology changes frequently, and those making things happen need to stay up-do-date with training. Embrace it, incorporate it as part of the incentives, make it part of the day, make it happen.
  2. DevSecOps are people, and they need rest. Thereā€™s only so much and so fast that people can work, and thatā€™s why we use technology. In DevSecOps, technology does not replace people, but enables them to perform their various duties at the speed of light.
  3. Metrics have to be as concrete as possible. How does management determine if personnel are doing things right and doing the right things? Judging success by hearsay and feeling is never a rational metric

Regardless of what else itā€™s called ā€“ DevOps with a security focus, DevOpsSec, Secure DevOps ā€“ the end result is to have Development, Operations, and Security work together to iteratively create a good and secure product that is delivered timely. When the culture adopts these elements, DevSecOps will flourish.


Mar 26 2021

70% of organizations recognize the importance of secure coding practices

Category: App SecurityDISC @ 10:03 am

A research from Secure Code Warrior has revealed an attitudinal shift in the software development industry, with organizations bucking traditional practices for DevOps and Secure DevOps.

secure coding practices

The global survey of professional developers and their managers found 70% of organizations recognize the importance of secure coding practices, with results indicating an industry-wide shift from reaction to prevention is underway.

Dr. Matias Madou, CTO at Secure Code Warrior, said, ā€œWe are seeing a fundamental shift in mindsets across the world, as the industry slowly moves from reactive, band-aid solutions rolled out after a breach, to the proactive and human-led practice of writing quality software that is intrinsically free from vulnerabilities right from the very first keystroke.ā€

ā€œThis research shows that ā€˜secure codeā€™ is becoming synonymous with ā€˜quality codeā€™ within software development, and security is becoming the responsibility of development teams and leadersā€”not just AppSec professionals,ā€ he said.

Secure coding practices

Reactive practices like using tools on deployed applications and manually reviewing code for vulnerabilities were the top two practices respondents associated with coding securely.

However, a proactive shift in mindset was evidenced across the globe, with 55% of the developers surveyed also recognising secure coding as the active, ongoing practice of writing software protected from vulnerabilities.

More on: 70% of organizations recognize the importance of secure coding practices

Secure by DesignĀ teaches developers how to use design to drive security in software development.Ā 

Tags: DevOps, SecDevOps, Secure Code


Mar 25 2021

Using memory encryption in web applications to help reduce the risk of Spectre attacks

Category: App SecurityDISC @ 10:08 am

The Spectre vulnerability, which stems from vulnerabilities at the CPU design level, has been known for over 3 years now. Whatā€™s so interesting about this PoC is that its feasibility for leaking the end-userā€™s data has now been proven for web applications, meaning that itā€™s no longer just theoretical.

The vulnerability in affected CPUs has to do with speculative execution, which in certain situations can leave behind observable side-effects and result in data leakage to the attacker. All the attacker needs is a way to execute exploit code in the same executing context as other JavaScript handling sensitive data.

The attacker could use the web supply chain, for instance, presenting itself as a useful library so that victims voluntarily add it to their webpages, or deliberately compromise a third-party library as a way to attack websites that use it. Another vehicle would be to find an injection vulnerability on the website and combine that with the Spectre exploit.

Regardless of the method, the list of victims would be long, as Spectre exploits the JavaScript engines of browsers across several different operating systems, processor architectures, and hardware generations.

Searching for better solutions

Tags: Spectre attacks


Mar 23 2021

Accellion Supply Chain Hack

Category: App Security,File Security,Vendor AssessmentDISC @ 11:37 pm

Tags: Hacking, patching, supply chain, vulnerabilities


« Previous PageNext Page »