#securecoding Suchergebnisse

Rule #1 of secure coding: users are chaos agents! They’ll put emojis in number fields and try SQL in name boxes. Validate everything before it touches your DB, one unchecked input can turn a secure app into a security nightmare. #securecoding #appsecurity #cybersecuritytips

EonWeaveLabs's tweet image. Rule #1 of secure coding: users are chaos agents!
They’ll put emojis in number fields and try SQL in name boxes.

Validate everything before it touches your DB, one unchecked input can turn a secure app into a security nightmare.

#securecoding #appsecurity #cybersecuritytips

Stop Trusting Input: 3 RULES Thank you to ThreatLocker for sponsoring this video and my trip to Black Hat USA 2025. #securecoding #threatlocker #blackhat


🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

Vibe Coding Will Get You HACKED (Here's the Fix) Thank you to @ThreatLocker​⁠​⁠ for sponsoring this video and my trip to Black Hat USA 2025! #blackhat #threatlocker #securecoding


🛡️Strengthen your #SecureCoding skills! Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA 📅28 Oct 2025 | 🕙10 AM–4 PM 📍Technopark,Thiruvananthapuram Learn #CERTC standards, secure design, and compliance tools. #STPI #CyberSecurity #NCSAM2025 #LDRA

stpitvpm's tweet image. 🛡️Strengthen your #SecureCoding skills!
Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA
📅28 Oct 2025 | 🕙10 AM–4 PM
📍Technopark,Thiruvananthapuram
Learn #CERTC standards, secure design, and compliance tools.
#STPI #CyberSecurity #NCSAM2025 #LDRA

4. Code Quality vs Code Speed Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential. #CleanCode #SecureCoding #AIDevTools

SatlokChannel's tweet image. 4. Code Quality vs Code Speed

Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential.
#CleanCode #SecureCoding #AIDevTools

☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2 Fui dev, arquitecto y también instructor certificado por Sun y Oracle. Java no solo cambió el desarrollo: Cambió mi vida. Gracias por 30 años de café, comunidad y código. #Java30 #SrJava #SecureCoding

knaverit's tweet image. ☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2
Fui dev, arquitecto y también instructor certificado por Sun y Oracle.
Java no solo cambió el desarrollo: Cambió mi vida.

Gracias por 30 años de café, comunidad y código.
#Java30 #SrJava #SecureCoding

This is how you use SAST findings to upskill developers in security, right in your Claude IDE. Brought to you by @dryrunsec + @secdim #sast #training #securecoding


What’s the #1 piece of advice Michael Howard gives developers about security? In this #OneDevQuestion, he explains why every input should be questioned. Learn more: msft.it/6017sOucJ #AppSec #SecureCoding


🦇 The battle begins. Meet Promptgeist Prime – the LLM monster that poisons your data & flips your context. 🎥 Watch the teaser (no spoilers here!) 👉 Full walkthrough: youtu.be/ed_zZzkcL14 👾 Join #Cybermon2025 & prove your #securecoding skills. #LLMSecurity


Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

safestack's tweet image. Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

#Securecode lovers! 👋 We've launched tons of new learning content & features on the SCW platform: AI Challenges, AI Security Rules on GitHub, Quests innovations, Vulnerability Insights & more. Ready to increase your #securecoding posture? Request a demo: ow.ly/aEkT50WQEsK


🎮 Countdown starts now: 20 days to go! #Cybermon2025: The Age of AI launches Oct 6. Face off against monsters inspired by real-world vulnerabilities & sharpen your #securecoding skills. #CyberSecurityAwarenessMonth


10,000+ secure code learning activities — powered by this crew. Here’s how we celebrated behind the scenes → #10KLessons #SecureCoding #Cybersecurity #WeAreSCW


⏳ One week left! #Cybermon2025 arrives Oct 6. ⚡ Fun, fast, hands-on #SecureCoding activities 🕒 Just 20–30 mins per week 👾 New monsters every Monday Ready to battle? Learn more: ow.ly/HYJl50X3UuF #CyberSecurityAwarenessMonth


🤖🚫 AI-powered "vibe coding" promises speed, but it's risky when developers treat AI output as fact. In @CSOonline, our CTO @mmadou warns that skipping review of generated code is a fast track to insecure code. Read more: ow.ly/859550XaHhn #AICoding #SecureCoding


Review code for insecure deserialization — only deserialize trusted data. Consider JSON over binary formats when possible #CyberSecurityMonth #Deserialization #SecureCoding


👾 Just 11 days until #Cybermon2025 kicks off! This year brings Cybermon Prime – AI-powered boss levels for devs ready to level up. Are you up for the challenge? Learn more: ow.ly/CBsX50X1RG4 #AppSec #SecureCoding #CyberSecurityAwarenessMonth


Rule #1 of secure coding: users are chaos agents! They’ll put emojis in number fields and try SQL in name boxes. Validate everything before it touches your DB, one unchecked input can turn a secure app into a security nightmare. #securecoding #appsecurity #cybersecuritytips

EonWeaveLabs's tweet image. Rule #1 of secure coding: users are chaos agents!
They’ll put emojis in number fields and try SQL in name boxes.

Validate everything before it touches your DB, one unchecked input can turn a secure app into a security nightmare.

#securecoding #appsecurity #cybersecuritytips

Review code for insecure deserialization — only deserialize trusted data. Consider JSON over binary formats when possible #CyberSecurityMonth #Deserialization #SecureCoding


Are your developers aware of security vulnerabilities before merging? With Cyberlysec, catch issues early and safeguard your code. 🌐💻 #DevOps #SecureCoding


If AI can code, it can hack. 🤖 Autonomous AI may soon exploit vulnerabilities without humans. The real defense comes from skilled people who can think like attackers and adapt in real-time. 💪 🔗 More from @CSOonline: csoonline.com/article/406907…. #AppSec #AI #SecureCoding


Jaime Jorge, CEO of @codacy, warns that exploiting vulnerabilities in AI-generated code is becoming a game. In his chat with @Richard Stiennon, Jorge explains that this isn’t just a tech issue; it is a mindset shift. 👉EM360TECH.short.gy/j1H6mJ #AIinDevOps #SecureCoding #EM360Tech


🤖🚫 AI-powered "vibe coding" promises speed, but it's risky when developers treat AI output as fact. In @CSOonline, our CTO @mmadou warns that skipping review of generated code is a fast track to insecure code. Read more: ow.ly/859550XaHhn #AICoding #SecureCoding


🦇 The battle begins. Meet Promptgeist Prime – the LLM monster that poisons your data & flips your context. 🎥 Watch the teaser (no spoilers here!) 👉 Full walkthrough: youtu.be/ed_zZzkcL14 👾 Join #Cybermon2025 & prove your #securecoding skills. #LLMSecurity


Google’s CodeMender AI has fixed 70+ security flaws in open-source code—fast, autonomous, and proactive. Powered by Gemini models, it’s reshaping secure coding. Would you trust AI to patch your code? #AvmConsulting #CodeMender #SecureCoding #AIInnovation

AvmConsulting's tweet image. Google’s CodeMender AI has fixed 70+ security flaws in open-source code—fast, autonomous, and proactive. Powered by Gemini models, it’s reshaping secure coding. Would you trust AI to patch your code? #AvmConsulting #CodeMender #SecureCoding #AIInnovation

🛡️Strengthen your #SecureCoding skills! Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA 📅28 Oct 2025 | 🕙10 AM–4 PM 📍Technopark,Thiruvananthapuram Learn #CERTC standards, secure design, and compliance tools. #STPI #CyberSecurity #NCSAM2025 #LDRA

stpitvpm's tweet image. 🛡️Strengthen your #SecureCoding skills!
Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA
📅28 Oct 2025 | 🕙10 AM–4 PM
📍Technopark,Thiruvananthapuram
Learn #CERTC standards, secure design, and compliance tools.
#STPI #CyberSecurity #NCSAM2025 #LDRA

🚨 #AICoding tools boost productivity but can hide security risks. Learn how to get complete visibility & control over AI-assisted coding to keep your software secure. Eliminate #ShadowAI risk & empower #SecureCoding! Read the blog: ow.ly/pOPt50X7Yhu


Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting

nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting
nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting
nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting
nextbrave_'s tweet image. Avoid insecure deserialization: never trust serialized objects from clients. Prefer safe formats (JSON), sign payloads, and whitelist types. #AppSec #Deserialization #SecureCoding #Pentesting

Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time! #vuejs #appsec #securecoding twp.ai/ImpwZv

shehackspurple's tweet image. Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time!
#vuejs #appsec #securecoding 
twp.ai/ImpwZv

Developers struggle with AI-generated code full of bugs & risks—CodeMender flips the script with autonomous, rock-solid security fixes that don’t break your app. This could change how we trust AI and protect our data forever #AIEthics #SecureCoding


Rule #1 of secure coding: users are chaos agents! They’ll put emojis in number fields and try SQL in name boxes. Validate everything before it touches your DB, one unchecked input can turn a secure app into a security nightmare. #securecoding #appsecurity #cybersecuritytips

EonWeaveLabs's tweet image. Rule #1 of secure coding: users are chaos agents!
They’ll put emojis in number fields and try SQL in name boxes.

Validate everything before it touches your DB, one unchecked input can turn a secure app into a security nightmare.

#securecoding #appsecurity #cybersecuritytips

🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯
ReversingLabs's tweet image. 🫶 Huge thanks to @shehackspurple for joining us at #BlackHat booth 3261 yesterday! She spoke with attendees about her essential book: Alice & Bob Learn #SecureCoding. Go Tanya 💯

4. Code Quality vs Code Speed Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential. #CleanCode #SecureCoding #AIDevTools

SatlokChannel's tweet image. 4. Code Quality vs Code Speed

Yes, AI helps write more code quickly, but not always better code. The study found AI-written code had a higher chance of being inefficient or insecure if used blindly. Review remains essential.
#CleanCode #SecureCoding #AIDevTools

☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2 Fui dev, arquitecto y también instructor certificado por Sun y Oracle. Java no solo cambió el desarrollo: Cambió mi vida. Gracias por 30 años de café, comunidad y código. #Java30 #SrJava #SecureCoding

knaverit's tweet image. ☕️ Java cumple 30 años y yo fui testigo desde el “Hello, World!” del SDK 1.2
Fui dev, arquitecto y también instructor certificado por Sun y Oracle.
Java no solo cambió el desarrollo: Cambió mi vida.

Gracias por 30 años de café, comunidad y código.
#Java30 #SrJava #SecureCoding

🛡️Strengthen your #SecureCoding skills! Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA 📅28 Oct 2025 | 🕙10 AM–4 PM 📍Technopark,Thiruvananthapuram Learn #CERTC standards, secure design, and compliance tools. #STPI #CyberSecurity #NCSAM2025 #LDRA

stpitvpm's tweet image. 🛡️Strengthen your #SecureCoding skills!
Join the Workshop on Secure Coding Practices by STPI Thiruvananthapuram & LDRA
📅28 Oct 2025 | 🕙10 AM–4 PM
📍Technopark,Thiruvananthapuram
Learn #CERTC standards, secure design, and compliance tools.
#STPI #CyberSecurity #NCSAM2025 #LDRA

Is "whitelisted IPs" just the bouncer keeping unwanted hosts out at DigitalOcean's nightclub? Source: devhubby.com/thread/how-to-… #SecureCoding #Deployment #TechTips #CodeNewbie #digitalocean #set

devhubbycom's tweet image. Is "whitelisted IPs" just the bouncer keeping unwanted hosts out at DigitalOcean's nightclub?

Source: devhubby.com/thread/how-to-…

#SecureCoding #Deployment #TechTips #CodeNewbie #digitalocean #set

Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

safestack's tweet image. Security isn't something that happens TO your code—it's something that happens IN your code. The best developers take ownership of security from design through deployment. How do you make security part of your development identity? #SecureCoding #DeveloperOwnership #CodeQuality

Attacking PHP Application Read more on our blog at blog.devsecopsguides.com/attacking-php Attacking NodeJS Application: Attacking APIs:  Attacking Docker Container:  #php #securecoding #appsec #devsecopsguides

Hadess_security's tweet image. Attacking PHP Application

Read more on our blog at blog.devsecopsguides.com/attacking-php

Attacking NodeJS Application: 

Attacking APIs: 

Attacking Docker Container: 

#php #securecoding #appsec #devsecopsguides

Attacking Docker Container Read more on our blog at blog.devsecopsguides.com/attacking-dock… Attacking AWS: Secure Coding Cheatsheets: #docker #container #aws #cloud #bucket #ec2 #iam #appsec #devops #DevSecOps

Hadess_security's tweet image. Attacking Docker Container

Read more on our blog at blog.devsecopsguides.com/attacking-dock…

Attacking AWS: 

Secure Coding Cheatsheets: 

#docker #container #aws #cloud #bucket #ec2 #iam #appsec #devops #DevSecOps


Insecure (de)serialization in Go (encoding/gob) by overwriting a field that cause encoder to confuse, use a lot of CPU and result in stack-overflow. If you develop a backend service, you must choose Go, when you care about security. #securecoding #challenge #go

pi3ch's tweet image. Insecure (de)serialization in Go (encoding/gob) by overwriting a field  that cause encoder to confuse, use a lot of CPU and result in stack-overflow. If you develop a backend service, you must choose Go, when you care about security. #securecoding #challenge #go

Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time! #vuejs #appsec #securecoding twp.ai/ImpwZv

shehackspurple's tweet image. Want to learn all the best security features of Vue.js? Download my free cheat sheet and sign up for my newsletter at the same time!
#vuejs #appsec #securecoding 
twp.ai/ImpwZv

🔐 Want to build secure Vue.js apps? In our latest blog, we’ve listed 5 essential security practices—from XSS prevention to safe data handling. 👇 🔗 resources.s4e.io/blog/5-essenti… #VueJS #CyberSecurity #SecureCoding #S4E #CTEM

secforeveryone's tweet image. 🔐 Want to build secure Vue.js apps?

In our latest blog, we’ve listed 5 essential security practices—from XSS prevention to safe data handling. 👇

🔗 resources.s4e.io/blog/5-essenti…

#VueJS #CyberSecurity #SecureCoding #S4E #CTEM

One does not simply patch security after deployment. Know how to secure code from the start with this ebook! ➡️ store.expliot.io/products/the-e… #infosec #securecoding #cybersecurity

expliot_io's tweet image. One does not simply patch security after deployment.

Know how to secure code from the start with this ebook!

➡️ store.expliot.io/products/the-e…

#infosec #securecoding #cybersecurity

Can you find the security vulnerability in this code? Take a look and share your thoughts in the comments #DevSecOps #AppSec #SecureCoding #LearnCybersecurity #CyberSyncHub #TechLiteracy #CyberSecurity

CyberSyncHub's tweet image. Can you find the security vulnerability in this code? 

Take a look and share your thoughts in the comments

 #DevSecOps #AppSec #SecureCoding #LearnCybersecurity #CyberSyncHub #TechLiteracy #CyberSecurity

Datei-Uploads in #Java sicher machen? Schütze dich vor: - CWE-22 (Path Traversal) - CWE-377 (Temp File Risks) - CWE-778 (Insufficient Logging) Baue mit @SvenRuppert & #Vaadin sichere Datei-Apps – inkl. NIO, Logging & Security-Fokus: javapro.io/de/erstellen-e… #SecureCoding #CWE

JAVAPROmagazin's tweet image. Datei-Uploads in #Java sicher machen?

Schütze dich vor:
- CWE-22 (Path Traversal)
- CWE-377 (Temp File Risks)
- CWE-778 (Insufficient Logging)

Baue mit @SvenRuppert & #Vaadin sichere Datei-Apps – inkl. NIO, Logging & Security-Fokus: javapro.io/de/erstellen-e…

#SecureCoding #CWE

Hashing collisions are a serious threat! 🚨 Our new video explains the "Birthday Problem" & how it can be exploited. 🤖 Learn to defend your code: ow.ly/2XFL50VnwCG #hashing #securecoding #cybersecurity

SecurityJourney's tweet image. Hashing collisions are a serious threat! 🚨 Our new video explains the "Birthday Problem" & how it can be exploited. 

🤖 Learn to defend your code: ow.ly/2XFL50VnwCG
#hashing #securecoding #cybersecurity

#AIcoding tools are incredible helpers -- until attackers turn them against you. In @DEVOPSdigest, our CTO @mmadou explores how AI-assisted development can be exploited & why #securecoding practices are more important than ever: ow.ly/R1g850WyOvU

SecCodeWarrior's tweet image. #AIcoding tools are incredible helpers -- until attackers turn them against you. In @DEVOPSdigest, our CTO @mmadou explores how AI-assisted development can be exploited & why #securecoding practices are more important than ever: ow.ly/R1g850WyOvU

Shifting left means catching vulnerabilities early, right in your DevOps pipeline. Find out how it strengthens your pipeline: blog.checkpoint.com/infinity-globa… #DevSecOps #SecureCoding #cybersecurity

CheckPointSW's tweet image. Shifting left means catching vulnerabilities early, right in your DevOps pipeline.

Find out how it strengthens your pipeline: blog.checkpoint.com/infinity-globa… 

#DevSecOps #SecureCoding #cybersecurity

🤩🤩🤩 ¡Hoy estás de suerte! "Desglosando el #SecureCoding 🖥️" Te contamos de qué se trata y cómo aplicarlo en tu empresa para una seguridad informática robusta. Esto en nuestro nuevo número ➡️ buff.ly/3PjR0oV

TBSeK_MX's tweet image. 🤩🤩🤩 ¡Hoy estás de suerte! "Desglosando el #SecureCoding 🖥️" Te contamos de qué se trata y cómo aplicarlo en tu empresa para una seguridad informática robusta. Esto en nuestro nuevo número ➡️ buff.ly/3PjR0oV

Loading...

Something went wrong.


Something went wrong.


United States Trends