programming
![open source security](https://img.helpnetsecurity.com/wp-content/uploads/2022/04/13072028/open_source_security-400x200.jpg)
What closed-source software developers can learn from their open-source counterparts
Open-source software has reached greater levels of security than ever before, but its increased adoption comes with new challenges. In this Help Net Security video, Josep …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/26101304/terminal-connect-400x200.jpg)
APIs are quickly becoming the most popular attack vector
In this Help Net Security video, Shay Levi, CTO at Noname Security, discusses the findings from a recent API security report, which reveals a growing number of API security …
![Fuzz CLI](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/22131547/fuzz_cli-fuzz_testing-400x200.jpg)
CI Fuzz CLI: Open-source tool simplifies fuzz testing for C++
Fuzz testing helps developers protect their applications against memory corruptions, crashes that cause downtime, and other security issues, including DoS and uncaught …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
What you need to know about Evil-Colon attacks
While novel attacks seem to emerge faster than TikTok trends, some warrant action before they’ve even had a chance to surface. This is the case for an attack we’ll refer to as …
![popular programming languages](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/16145238/popular_programming_languages-2022-400x200.jpg)
The 25 most popular programming languages and trends
CircleCI released the 2022 State of Software Delivery report, which examines two years of data from more than a quarter billion workflows and nearly 50,000 organizations …
![Java](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/15105341/java-blocks-400x200.jpg)
How to manage the intersection of Java, security and DevOps at a low complexity cost
In this Help Net Security video, Erik Costlow, Senior Director of Product Management at Azul, talks about Java centric vulnerabilities and the headache they have become for …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
“ParseThru” vulnerability allows unauthorized access to cloud-native applications
A new vulnerability found in GoLang-based applications allows a threat actor to bypass validations under certain conditions and gain unauthorized access to cloud-native …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092916/code1-400x200.jpg)
Why your API gateway is not enough for API security?
The emergence of cloud computing architectures has caused enterprises to rethink the way applications are scaled. Impetuses were put on companies to get away from deploying …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092903/lock-blue-400x200.jpg)
Applying Shift Left principles to third party risk management
In this Help Net Security video, Etai Hochman, CTO at Mirato, talks about applying Shift Left, a concept that originated with developers to find and prevent defects early in …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Trojan Source bugs may lead to extensive supply-chain attacks on source code
Cambridge University researchers have detailed a new way targeted vulnerabilities can be introduced into source code while making them invisible to human code reviewers, …
![HITB training](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/23073359/hitb-training-400x200.jpg)
What is wrong with developer security training?
“Turn a developer into a hacker” is a commonly heard call. There are many online courses and trainings that ostensibly teach developers how to write code that’s …
![icosahedral](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103458/icosahedral-400x200.jpg)
Data teams are discovering the benefits of automation and flexible coding
Ascend.io announced results from its research study about the work capacity and priorities of data teams, including data analysts, data scientists, data engineers, and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD