#securecoding search results

Stop Trusting Input: 3 RULES Thank you to ThreatLocker for sponsoring this video and my trip to Black Hat USA 2025. #securecoding #threatlocker #blackhat


🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

🦇 The battle begins. Meet Promptgeist Prime – the LLM monster that poisons your data & flips your context. 🎥 Watch the teaser (no spoilers here!) 👉 Full walkthrough: youtu.be/ed_zZzkcL14 👾 Join #Cybermon2025 & prove your #securecoding skills. #LLMSecurity


🛡️Strengthen your #SecureCoding skills! Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA 📅28 Oct 2025 | 🕙10 AM–4 PM 📍Technopark,Thiruvananthapuram Learn #CERTC standards, secure design, and compliance tools. #STPI #CyberSecurity #NCSAM2025 #LDRA

stpitvpm's tweet image. 🛡️Strengthen your #SecureCoding skills!
Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA
📅28 Oct 2025 | 🕙10 AM–4 PM
📍Technopark,Thiruvananthapuram
Learn #CERTC standards, secure design, and compliance tools.
#STPI #CyberSecurity #NCSAM2025 #LDRA

Vibe Coding Will Get You HACKED (Here's the Fix) Thank you to @ThreatLocker​⁠​⁠ for sponsoring this video and my trip to Black Hat USA 2025! #blackhat #threatlocker #securecoding


🤖🚫 AI-powered "vibe coding" promises speed, but it's risky when developers treat AI output as fact. In @CSOonline, our CTO @mmadou warns that skipping review of generated code is a fast track to insecure code. Read more: ow.ly/859550XaHhn #AICoding #SecureCoding


☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2 Fui dev, arquitecto y también instructor certificado por Sun y Oracle. Java no solo cambió el desarrollo: Cambió mi vida. Gracias por 30 años de café, comunidad y código. #Java30 #SrJava #SecureCoding

knaverit's tweet image. ☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2
Fui dev, arquitecto y también instructor certificado por Sun y Oracle.
Java no solo cambió el desarrollo: Cambió mi vida.

Gracias por 30 años de café, comunidad y código.
#Java30 #SrJava #SecureCoding

#Securecode lovers! 👋 We've launched tons of new learning content & features on the SCW platform: AI Challenges, AI Security Rules on GitHub, Quests innovations, Vulnerability Insights & more. Ready to increase your #securecoding posture? Request a demo: ow.ly/aEkT50WQEsK


4. Code Quality vs Code Speed Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential. #CleanCode #SecureCoding #AIDevTools

SatlokChannel's tweet image. 4. Code Quality vs Code Speed

Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential.
#CleanCode #SecureCoding #AIDevTools

This is how you use SAST findings to upskill developers in security, right in your Claude IDE. Brought to you by @dryrunsec + @secdim #sast #training #securecoding


🎮 Countdown starts now: 20 days to go! #Cybermon2025: The Age of AI launches Oct 6. Face off against monsters inspired by real-world vulnerabilities & sharpen your #securecoding skills. #CyberSecurityAwarenessMonth


Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

safestack's tweet image. Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

10,000+ secure code learning activities — powered by this crew. Here’s how we celebrated behind the scenes → #10KLessons #SecureCoding #Cybersecurity #WeAreSCW


What’s the #1 piece of advice Michael Howard gives developers about security? In this #OneDevQuestion, he explains why every input should be questioned. Learn more: msft.it/6017sOucJ #AppSec #SecureCoding


👾 Just 11 days until #Cybermon2025 kicks off! This year brings Cybermon Prime – AI-powered boss levels for devs ready to level up. Are you up for the challenge? Learn more: ow.ly/CBsX50X1RG4 #AppSec #SecureCoding #CyberSecurityAwarenessMonth


New AI Challenges! Step into an AI-powered workflow with Obi, your simulated coding assistant, and review, analyze, and secure generated code. 🎥 Demo below 👇 + try it today → ow.ly/8atH50WYVUE #SecureCoding #AppSec


⏳ One week left! #Cybermon2025 arrives Oct 6. ⚡ Fun, fast, hands-on #SecureCoding activities 🕒 Just 20–30 mins per week 👾 New monsters every Monday Ready to battle? Learn more: ow.ly/HYJl50X3UuF #CyberSecurityAwarenessMonth


🎙️ In this ConversingLabs clip, @shehackspurple discusses her newest book, Alice & Bob Learn #SecureCoding. 📚 Want a free, signed copy? Stop by #BlackHat booth 3261 on Aug 6 at 2pm to claim yours & meet Tanya!


🤖🚫 AI-powered "vibe coding" promises speed, but it's risky when developers treat AI output as fact. In @CSOonline, our CTO @mmadou warns that skipping review of generated code is a fast track to insecure code. Read more: ow.ly/859550XaHhn #AICoding #SecureCoding


🦇 The battle begins. Meet Promptgeist Prime – the LLM monster that poisons your data & flips your context. 🎥 Watch the teaser (no spoilers here!) 👉 Full walkthrough: youtu.be/ed_zZzkcL14 👾 Join #Cybermon2025 & prove your #securecoding skills. #LLMSecurity


Google’s CodeMender AI has fixed 70+ security flaws in open-source code—fast, autonomous, and proactive. Powered by Gemini models, it’s reshaping secure coding. Would you trust AI to patch your code? #AvmConsulting #CodeMender #SecureCoding #AIInnovation

AvmConsulting's tweet image. Google’s CodeMender AI has fixed 70+ security flaws in open-source code—fast, autonomous, and proactive. Powered by Gemini models, it’s reshaping secure coding. Would you trust AI to patch your code? #AvmConsulting #CodeMender #SecureCoding #AIInnovation

🛡️Strengthen your #SecureCoding skills! Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA 📅28 Oct 2025 | 🕙10 AM–4 PM 📍Technopark,Thiruvananthapuram Learn #CERTC standards, secure design, and compliance tools. #STPI #CyberSecurity #NCSAM2025 #LDRA

stpitvpm's tweet image. 🛡️Strengthen your #SecureCoding skills!
Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA
📅28 Oct 2025 | 🕙10 AM–4 PM
📍Technopark,Thiruvananthapuram
Learn #CERTC standards, secure design, and compliance tools.
#STPI #CyberSecurity #NCSAM2025 #LDRA

🚨 #AICoding tools boost productivity but can hide security risks. Learn how to get complete visibility & control over AI-assisted coding to keep your software secure. Eliminate #ShadowAI risk & empower #SecureCoding! Read the blog: ow.ly/pOPt50X7Yhu


Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting

nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting
nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting
nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting
nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting

Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time! #vuejs #appsec #securecoding twp.ai/ImpwZv

shehackspurple's tweet image. Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time!
#vuejs #appsec #securecoding 
twp.ai/ImpwZv

Developers struggle with AI-generated code full of bugs & risks—CodeMender flips the script with autonomous, rock-solid security fixes that don’t break your app. This could change how we trust AI and protect our data forever #AIEthics #SecureCoding


🚀 It’s here! #Cybermon2025: The Age of AI starts today. 👾 Battle vulnerabilities ⚡ Conquer Cybermon Prime 🏆 Become a Cyberhero Join devs worldwide this #CyberSecurityAwarenessMonth. Where to find it: ow.ly/Ak0r50X7mVn #SecureCoding #AppSec


Never trust user input — even JSON. Always validate and sanitize using whitelists, not blacklists. Framework validation ≠ full protection. #CyberSecurityMonth #InputValidation #SecureCoding


🧠 Buffer Overflow — when a program writes more data than a buffer can hold, spilling into memory. It can crash apps or let attackers run code. Prevent with bounds checks, safe languages, ASLR & DEP. 🔒 #SecureCoding #InfoSec #CyberSecurity


🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

🛡️Strengthen your #SecureCoding skills! Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA 📅28 Oct 2025 | 🕙10 AM–4 PM 📍Technopark,Thiruvananthapuram Learn #CERTC standards, secure design, and compliance tools. #STPI #CyberSecurity #NCSAM2025 #LDRA

stpitvpm's tweet image. 🛡️Strengthen your #SecureCoding skills!
Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA
📅28 Oct 2025 | 🕙10 AM–4 PM
📍Technopark,Thiruvananthapuram
Learn #CERTC standards, secure design, and compliance tools.
#STPI #CyberSecurity #NCSAM2025 #LDRA

☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2 Fui dev, arquitecto y también instructor certificado por Sun y Oracle. Java no solo cambió el desarrollo: Cambió mi vida. Gracias por 30 años de café, comunidad y código. #Java30 #SrJava #SecureCoding

knaverit's tweet image. ☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2
Fui dev, arquitecto y también instructor certificado por Sun y Oracle.
Java no solo cambió el desarrollo: Cambió mi vida.

Gracias por 30 años de café, comunidad y código.
#Java30 #SrJava #SecureCoding

Attacking PHP Application Read more on our blog at blog.devsecopsguides.com/attacking-php Attacking NodeJS Application: Attacking APIs:  Attacking Docker Container:  #php #securecoding #appsec #devsecopsguides

Hadess_security's tweet image. Attacking PHP Application

Read more on our blog at blog.devsecopsguides.com/attacking-php

Attacking NodeJS Application: 

Attacking APIs: 

Attacking Docker Container: 

#php #securecoding #appsec #devsecopsguides

Attacking Docker Container Read more on our blog at blog.devsecopsguides.com/attacking-dock… Attacking AWS: Secure Coding Cheatsheets: #docker #container #aws #cloud #bucket #ec2 #iam #appsec #devops #DevSecOps

Hadess_security's tweet image. Attacking Docker Container

Read more on our blog at blog.devsecopsguides.com/attacking-dock…

Attacking AWS: 

Secure Coding Cheatsheets: 

#docker #container #aws #cloud #bucket #ec2 #iam #appsec #devops #DevSecOps


Is "whitelisted IPs" just the bouncer keeping unwanted hosts out at DigitalOcean's nightclub? Source: devhubby.com/thread/how-to-… #SecureCoding #Deployment #TechTips #CodeNewbie #digitalocean #set

devhubbycom's tweet image. Is "whitelisted IPs" just the bouncer keeping unwanted hosts out at DigitalOcean's nightclub?

Source: devhubby.com/thread/how-to-…

#SecureCoding #Deployment #TechTips #CodeNewbie #digitalocean #set

Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

safestack's tweet image. Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

👩‍💻 Your daily npm pull may carry unexpected risks! The malicious npm attack impacted 18 packages with 2.6B downloads weekly. IT admins, find out how the infection propagates & steps to mitigate it. 🚨 #hacking #securecoding #NetworkSecurity #NPM bit.ly/4psy8ER

DosSantoshack's tweet image. 👩‍💻 Your daily npm pull may carry unexpected risks! The malicious npm attack impacted 18 packages with 2.6B downloads weekly. IT admins, find out how the infection propagates & steps to mitigate it. 🚨 #hacking #securecoding #NetworkSecurity #NPM bit.ly/4psy8ER

Insecure (de)serialization in Go (encoding/gob) by overwriting a field that cause encoder to confuse, use a lot of CPU and result in stack-overflow. If you develop a backend service, you must choose Go, when you care about security. #securecoding #challenge #go

pi3ch's tweet image. Insecure (de)serialization in Go (encoding/gob) by overwriting a field  that cause encoder to confuse, use a lot of CPU and result in stack-overflow. If you develop a backend service, you must choose Go, when you care about security. #securecoding #challenge #go

4. Code Quality vs Code Speed Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential. #CleanCode #SecureCoding #AIDevTools

SatlokChannel's tweet image. 4. Code Quality vs Code Speed

Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential.
#CleanCode #SecureCoding #AIDevTools

SecDim values community contributions. Challenges from AppSec Village at DEF CON 33 are featured in our Weekly Incident game for those missed it. Thanks again to @zi0Black and @Becojo for their contributions 👉 play.secdim.com/game/weekly-in… #appsec #programming #securecoding

secdim's tweet image. SecDim values community contributions. Challenges from AppSec Village at DEF CON 33 are featured in our Weekly Incident game for those missed it.

Thanks again to @zi0Black and @Becojo for their contributions

👉 play.secdim.com/game/weekly-in…

#appsec #programming #securecoding

#OnlineTraining 🚨 1 Day Left! Ready to build secure, AI-powered software? Join our certification program and get hands-on with AI Security & SSDLC essentials. 🔐 Learn. Build. Secure the future. 👉 Register now: docs.google.com/forms/d/e/1FAI… #SecureCoding #AIinSecurity

SSOIndia's tweet image. #OnlineTraining
🚨 1 Day Left! Ready to build secure, AI-powered software?
Join our certification program and get hands-on with AI Security & SSDLC essentials.

🔐 Learn. Build. Secure the future.
👉 Register now: docs.google.com/forms/d/e/1FAI…

#SecureCoding #AIinSecurity…

Datei-Uploads in #Java sicher machen? Schütze dich vor: - CWE-22 (Path Traversal) - CWE-377 (Temp File Risks) - CWE-778 (Insufficient Logging) Baue mit @SvenRuppert & #Vaadin sichere Datei-Apps – inkl. NIO, Logging & Security-Fokus: javapro.io/de/erstellen-e… #SecureCoding #CWE

JAVAPROmagazin's tweet image. Datei-Uploads in #Java sicher machen?

Schütze dich vor:
- CWE-22 (Path Traversal)
- CWE-377 (Temp File Risks)
- CWE-778 (Insufficient Logging)

Baue mit @SvenRuppert & #Vaadin sichere Datei-Apps – inkl. NIO, Logging & Security-Fokus: javapro.io/de/erstellen-e…

#SecureCoding #CWE

🛡️ New to API security? This beginner-friendly guide from @massimo_nardone walks you through securing #RESTful APIs with real-world examples—no fluff, just practical solutions. 📚 #APIDevelopment #SecureCoding #WebSecurity #Java #RESTAPI #DevTips 🔗 ow.ly/peez50Wf7Ts

Apress's tweet image. 🛡️ New to API security? This beginner-friendly guide  from @massimo_nardone walks you through securing #RESTful APIs with real-world examples—no fluff, just practical solutions. 📚 #APIDevelopment #SecureCoding #WebSecurity #Java #RESTAPI #DevTips

🔗 ow.ly/peez50Wf7Ts

Shifting left means catching vulnerabilities early, right in your DevOps pipeline. Find out how it strengthens your pipeline: blog.checkpoint.com/infinity-globa… #DevSecOps #SecureCoding #cybersecurity

CheckPointSW's tweet image. Shifting left means catching vulnerabilities early, right in your DevOps pipeline.

Find out how it strengthens your pipeline: blog.checkpoint.com/infinity-globa… 

#DevSecOps #SecureCoding #cybersecurity

Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time! #vuejs #appsec #securecoding twp.ai/ImplI0

shehackspurple's tweet image. Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time!
#vuejs #appsec #securecoding 
twp.ai/ImplI0

This week, the @SecureFlag team traveled to Barcelona to discuss the latest #SecureCoding and #ThreatModeling advancements at #BCC24. A special shoutout to everyone who visited us and made this event a resounding success. Keep an eye on our page for more events coming soon!

SecureFlag's tweet image. This week, the @SecureFlag team traveled to Barcelona to discuss the latest #SecureCoding and #ThreatModeling advancements at #BCC24.

A special shoutout to everyone who visited us and made this event a resounding success. Keep an eye on our page for more events coming soon!
SecureFlag's tweet image. This week, the @SecureFlag team traveled to Barcelona to discuss the latest #SecureCoding and #ThreatModeling advancements at #BCC24.

A special shoutout to everyone who visited us and made this event a resounding success. Keep an eye on our page for more events coming soon!
SecureFlag's tweet image. This week, the @SecureFlag team traveled to Barcelona to discuss the latest #SecureCoding and #ThreatModeling advancements at #BCC24.

A special shoutout to everyone who visited us and made this event a resounding success. Keep an eye on our page for more events coming soon!
SecureFlag's tweet image. This week, the @SecureFlag team traveled to Barcelona to discuss the latest #SecureCoding and #ThreatModeling advancements at #BCC24.

A special shoutout to everyone who visited us and made this event a resounding success. Keep an eye on our page for more events coming soon!

Mini #securecoding lesson: APIs are often where #IDOR vulnerabilities live. They’re scriptable, discoverable, and rarely protected by frontend logic. Even endpoints not visible to users are vulnerable! Attackers use tools like Burp or Postman to find and exploit them. Easily!

shehackspurple's tweet image. Mini #securecoding lesson: APIs are often where #IDOR vulnerabilities live. They’re scriptable, discoverable, and rarely protected by frontend logic. Even endpoints not visible to users are vulnerable! Attackers use tools like Burp or Postman to find and exploit them. Easily!

Last chance to register for the Career Accelerator Program in Secure Coding info session. Learn how you can get in-demand skills and advance your career in #Cybersecurity or #SecureCoding. Register now:  bit.ly/4dWrCjs

WatSPEEDUW's tweet image. Last chance to register for the Career Accelerator Program in Secure Coding info session. Learn how you can get in-demand skills and advance your career in #Cybersecurity or #SecureCoding. Register now:  bit.ly/4dWrCjs

Loading...

Something went wrong.


Something went wrong.


United States Trends