#codingvulnerabilities wyniki wyszukiwania
Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0
A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to: 🔐Secure your code and open source components 📈Track, manage, and remediate at scale 💪Empower developers with training #CodingVulnerabilities #SecureCode #SecurityFirst
79% of code is shipped with known vulnerabilities. That’s why you need Codebashing to: 📈Gain full control and visibility 👨🏻🎓Identify areas that need improvement 💡Tailor secure code training to your needs #CodingVulnerabilities #Codebashing #FlexibleTrainingProgram
Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0
Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->
🚨This repository contain a lot of web and api vulnerability checklist🚨 📥lots of vulnerability ideas and tips from twitter✅ 📥Source github.com/Az0x7/vulnerab… #bugbountytip #bugbountytips #ethicalhacking #CyberSecurity #Pentesting #sqli #xss #CyberSecurityAwareness
Hackers 🔥 This code contains at least 2 serious vulnerabilities. Can you spot them? 😋 What would be your exploit? 🤔
Vulnerability checklist: 📓⚔️ This repository contains a lot of web and API vulnerability checklist, a lot of vulnerability ideas, and tips from twitter - github.com/Az0x7/vulnerab… #infosec #cybersec #bugbountytips
🔔New paper: Can reasoning models hide their reasoning? We stress-tested Chain-of-Thought (CoT) monitoring and found that while monitors detect ~96% of hidden malicious intent under normal conditions, ⚠️detection can collapse to ~10% under strong obfuscation pressure. 🧵
hey hi hello we've been seeing summa dat WSUS sussy baka CVE-2025-59287 remote code execution exploitation windows servers with WSUS ports 8530 & 8531 exposed ( -- why?) getting point-and-shoot popped from a POC already public huntress.com/blog/exploitat… prolly limited ITW…
🛡️ We added Adobe CVE-2025-54236 and Microsoft CVE-2025-59287 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
🔥Find critical vulnerabilities in js files✨ Looks inside this JS files: 🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base Read the full method 👇🏼 t.me/ShellSec/176
⚠️ 35K+ VS Code installs hit by GlassWorm malware. Trusted tools turned into attack vectors. 🧠 Discover unseen risks → DigitalWarfare.com 🔗 linkedin.com/pulse/invisibl…
When you're building APIs in Node.js, there are some security best practices you should follow. These will help you harden your APIs and protect them from common threats. In this guide, Manish shows you how to use environment variables, validate input, rate limit your…
Day 23 of #100DaysOfCyberSecurity 🤭 A single bug. A million-dollar breach. That’s how software vulnerabilities are born. They start small. A missed validation, a buffer that spills over, a developer too confident to double-check. Then one day, someone finds the gap. @ireteeh
Day 22 of #100DaysOfCyberSecurity 🤭 Imagine locking your house, only to find out the walls themselves were whispering your secrets. That’s what Meltdown and Spectre did to computers. As promised yesterday, here's more on Hardware vulnerabilities! ⤵️ @ireteeh
Hackers 🔥 This code is from an unpatched WordPress plugin 🤯 Can you see the vulnerability? 🔎
🚨CVE-2025-62641: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where…
Ever wonder how deserialization bugs like CVE-2025-59287 turn your update server into a hacker’s playground? It’s when untrusted data gets unpacked into code—boom, remote execution. Simple fix? Validate inputs religiously. #Hacking #Vulnerability #CyberSec
I am proud to share the announcement about our CodeMender project at @GoogleDeepMind, an agent that can automatically fix a range of code security vulnerabilities. From only a modest-compute run, our agent submitted 72 high-quality fixes to vulnerable code in popular codebases,…
Something went wrong.
Something went wrong.
United States Trends
- 1. Luka 97.9K posts
- 2. Dodgers 122K posts
- 3. Blue Jays 82.5K posts
- 4. #WorldSeries 104K posts
- 5. #LakeShow 3,588 posts
- 6. #TheLastDriveIn 4,579 posts
- 7. Snell 14.4K posts
- 8. Halo 163K posts
- 9. Mavs 13.5K posts
- 10. Toronto 67.8K posts
- 11. Marcus Smart 3,637 posts
- 12. #SmackDown 34.6K posts
- 13. #Worlds2025 23.9K posts
- 14. Nico Harrison 2,500 posts
- 15. Flyquest 2,812 posts
- 16. Kyshawn George 4,291 posts
- 17. Blazers 10.6K posts
- 18. Vando 2,673 posts
- 19. Addison Barger 18.3K posts
- 20. Naz Reid N/A