Hacker News
- State of Software Security: open-source Edition https://www.veracode.com/blog/research/announcing-state-software-security-v11-open-source-edition 5 comments
- Executable Archaeology: The Case Of The Stupid Thing Eating All My RAM http://www.veracode.com/blog/2013/05/executable-archaeology-the-case-of-the-stupid-thing-eating-all-my-ram/ 40 comments
- Anti-Debugging - A Developers View https://www.veracode.com/images/pdf/whitepaper_antidebugging.pdf 2 comments
- This blog post describes "recently" found Log4j2 vulnerability written on... January, 2019 https://www.veracode.com/blog/research/exploiting-jndi-injections-java 19 comments programming
- Log4J zero day remote code execution exploit and what it means for us self hosters? https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228 46 comments selfhosted
- Security Flaw Heat Map https://www.veracode.com/sites/default/files/pdf/resources/ipapers/security-flaw-heatmap/index.html 15 comments programming
- Go vulnerability analysis for security compliance https://www.veracode.com/security/vulnerability-scanning-tools 5 comments golang
- Learn how to use Message Digest aka hashing functions in Java, along with some use cases https://www.veracode.com/blog/research/message-digests-aka-hashing-functions 3 comments java
- Learn how to use Message Digest aka hashing functions in Java, along with some use cases https://www.veracode.com/blog/research/message-digests-aka-hashing-functions 22 comments crypto
- Learn what to be wary about, what secured choices to make while using Java Encryption API https://www.veracode.com/blog/research/encryption-and-decryption-java-cryptography 5 comments crypto
- Simplifying how to use Cryptographically Secure Pseudo-Random Number Generators securely in java https://www.veracode.com/blog/research/cryptographically-secure-pseudo-random-number-generator-csprng 3 comments crypto
- X-post: Blog series on various aspects of Java cryptography and things to be wary about. Stay tuned! https://www.veracode.com/blog/research/how-get-started-using-java-cryptography-securely 3 comments java
- Blog series on various aspects of Java cryptography and things to be wary about. Stay tuned! https://www.veracode.com/blog/research/how-get-started-using-java-cryptography-securely?sdf&utm_content=buffer5e760&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer 10 comments crypto
- Supporting software that spans 50 years of history. https://www.veracode.com/blog/secure-development/helping-developers-move-faster 3 comments software
- Golang’s Context Aware HTML Templates http://www.veracode.com/blog/2013/12/golangs-context-aware-html-templates/ 9 comments netsec
- Executable Archaeology: The Case Of The Stupid Thing Eating All My RAM http://www.veracode.com/blog/2013/05/executable-archaeology-the-case-of-the-stupid-thing-eating-all-my-ram/ 35 comments programming
- Security Headers on the Top 1,000,000 Websites http://www.veracode.com/blog/2012/11/security-headers-report/ 4 comments netsec
- Common Malware Types: Cybersecurity 101 http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ 3 comments netsec
- How Sally Got Owned: an illustrated example of how piracy can endanger your mobile device http://www.veracode.com/blog/2012/07/how-sally-got-owned-an-illustrated-example-of-how-piracy-can-endanger-your-mobile-device/ 12 comments netsec
- Between You and Me, This Isn't Private - how a sloppily coded app can betray you http://www.veracode.com/blog/2012/07/between-you-and-me-this-isnt-private/ 14 comments netsec
- "I didn't pay you for me to look foolish!" -- humorous developer reactions to security flaws http://www.veracode.com/blog/2009/05/but-thats-impossible/ 5 comments programming