Qwiet AI Honored as Winner of Best Application Security Solution at the 2025 SC Awards
The rise of AI-generated code has indeed been a productivity breakthrough. However, it has also ushered in a new class of threat that most security teams are not adequately prepared for: the urgent and looming danger of slopsquatting. What Is Slopsquatting? Slopsquatting is a novel and unprecedented supply chain attack that exploits a flaw in […]
READ MOREFrontend security is a critical aspect of web application development. Attackers often target the front end as the first line of user interaction, looking to exploit vulnerabilities. This article delves into essential practices for securing your user interface and safeguarding it against common attacks. Frontend Security Risks The front end of a web application, typically […]
Researchers recently uncovered a vulnerability in Hugging Face’s Safetensor conversion service and its associated service bot that could allow attackers to hijack user-submitted language models, ultimately resulting in potential supply chain attacks. For those not in the know, Hugging Face is a platform for community collaboration on AI models, datasets, and applications. Users of the […]
“We, as a nation, have the ability – and the responsibility – to reduce the attack surface in cyberspace and prevent entire classes of security bugs from entering the digital ecosystem, but that means we need to tackle the hard problem of moving to memory safe programming languages,” – Harry Coker (US National Cyber Director) […]
Cooking and software development have a lot in common. With cooking, you bring together different ingredients, looking at how the flavors blend and textures combine. With software development, you combine different components, including open-source libraries and your code. With cooking, you might decide to take something from a recipe, change it a bit, and create […]
Introduction RESTful APIs are the linchpins of software communication, facilitating data exchange between diverse systems. Their ubiquity and accessibility, however, make them prime targets for exploitation. This article aims to fortify your approach to API security by providing practical tips and shedding light on common vulnerabilities. The Security Landscape of RESTful APIs RESTful APIs are […]
For anyone who’s ever had test anxiety, notification of any audit can send them right back to middle or high school. An internal audit is basically like working with a tutor who helps you find mistakes while an external auditor can feel like having a grumpy teacher marking you down for not crossing a “t” […]
Introduction In software development, transitioning to a microservices architecture is like breaking a big structure into smaller, more connected units. This change lets you scale and be flexible but also brings security challenges. This article looks at how to secure a microservices architecture. It focuses on strategies to isolate and protect each service. Security Risks […]
Are your Docker containers as secure as they should be? In this article, we delve into Docker and containerization, underscoring the paramount importance of security in this increasingly container-reliant era. By exploring best practices and common challenges, this piece equips you with the essential knowledge to safeguard your Docker environments against looming threats. Understanding Docker […]
Back in 1893, the Lizzie Borden murders, where the Massachusetts woman was accused of killing both her parents with an ax, captivated the public and news media. Eventually found not guilty, one fundamental question perplexed police officers and the jury. Every door inside the Borden house had its own lock and corresponding key, an attempt […]