HackerSecret.com - The Most Authoritative Site in the World on the Hacking Tools and Techniques, Penetration Testing and CyberSecurity

  • Home
  • Visit Our Shop
  • Download the free App
  • Contact us for Info
VISIT OUR SHOP! CLICK HERE !

Did You Read Our Most Popular 2020 Blog Posts?

  • 0
Saturday, 06 March 2021 / Published in Hacking

What was top of mind for your peers regarding AppSec in 2020?

Yes, we realize no one really wants a 2020 retrospective ??? who wants to look back at that mess? But we are going to carry on with our annual look-back at our most popular blogs from the previous year. We always gain a lot of insight with this exercise ??? we find out what resonated with security professionals and developers, uncover trends, and learn what people have questions or concerns about. We hope you find this valuable too.

So what were the hot AppSec topics in 2020? Topping the list: Developer security training, best practices made practical, open source security, technical details on vulnerabilities, and, of course, the sudden shift to remote work and a digital world last March. Did you catch all these popular blog posts?

Developer security training

Our new Security Labs offering was a hot topic last year. Clearly, training developers on secure coding is a requirement and a concern for many. If you want to see what Security Labs is all about, check out the Community Edition. Developers can use it to learn to code securely by hacking and patching real apps, at no cost.

Announcing Veracode Security Labs Community Edition

Stay Sharp and Squash Security Debt With Veracode Security Labs

Our survey report with ESG covered some of the pain points organizations are facing regarding security training, and blogs on that topic were in our most-viewed list as well.

16% of Orgs Require Developers to Self-Educate on Security

How 80% of Orgs Can Overcome a Lack of Training for Developers

Best practices for the rest of us

Our guide on AppSec best practices vs. practicalities and its associated blog were among our most-read content pieces last year. Highlighting not only what to strive for, but also where to start, with application security seemed to resonate with many.

Best Practices and Practical Steps to Guide Your AppSec Journey

Securing open source code

As with the past several years, open source security was one of the most popular topics. The first open source edition of our annual State of Software Security report got a lot of attention in 2020. Take a look at the report to get the results of our analysis of 351,000 external libraries in 85,000 apps. We unearthed some really interesting data about the number of dependencies in open source libraries, and about challenges and best practices in securing them.

Announcing Our State of Software Security: Open Source Edition

Breaking Down Risky Open Source Libraries by Language

Details on vulnerabilities and secure coding

Blogs that take a technical deep dive into particular vulnerabilities typically resonate with our audience, and last year was no exception. Our blog posts on spring view manipulation vulnerability and preventing sensitive data exposure got a lot of attention in 2020.

Write Code That Protects Sensitive User Data

Spring View Manipulation Vulnerability

Covid life

And finally ??ヲ a topic of interest last year on our blog was life at Veracode, both professional and personal, after the Covid shutdown. Our two blogs on the topic were some of our most viewed. We especially like the one about all the Veracoders suddenly working from home (The pets! The amazing Star Wars workspace!). It was quite the upheaval at the time, but now it???s hard to remember life with bumper-to-bumper traffic, conference rooms, and hallway conversations. And stay tuned ??ヲ as we approach the one-year anniversary of our shift to remote work, we???re looking back and thinking about all we???ve learned and pulling it all together in another blog post on the topic.

We???re All WFH Too ??? Here???s What We???ve Learned

Business Continuity During the COVID-19 Outbreak ??? We Are Here to Help

Keep up with the latest AppSec news and advice

We hope you found some useful information in these blog highlights. Don???t miss any gems this year — stay up to date with all our content on AppSec news and best practices in 2021 by becoming a content subscriber. We???ll send you our monthly newsletter (and some exclusive content) to keep you in the loop. Happy 2021 everyone, thanks for reading and engaging with our content — stay secure, stay healthy, and stay sane!

Application Security Research, News, and Education Blog

2020BlogMostPopularPostsRead

Did You Read Our Most Popular 2018 Blog Posts?

  • 0
Sunday, 16 June 2019 / Published in Hacking

Every January, we get a lot of valuable insights by looking back at our most popular blog posts in the previous year, and 2018 was no exception. The posts that resonated the most last year paint a clear picture of topics most important to the security and development communities – from open source risk, to using AppSec as a competitive differentiator, to security’s new role in a DevOps world. The popularity of these posts highlights the big application security questions and concerns on the minds of security professionals and developers in 2018.

Open source risk still a major concern

Just as in the previous couple years, open source risk was a hot AppSec topic in 2018. Applications are increasingly composed of more open source code than first-party code, and that trend has serious security implications. A blog about the trends in open source security and two blogs about 2018 breaches related to open source code were featured in our top-10 most popular blogs:

Trends in Open Source Security

New Apache Struts Vulnerability Highlights Need for Software Composition Analysis

How to Prevent a Breach from Spring Break

Software security becomes a competitive differentiator

We’ve started to hear organizations talk about the need to use application security as a competitive differentiator. If their software is secure, and the competition’s isn’t, they’ve got an edge. In fact, we launched our Verified program last year to address this need. Increasingly, quality software means secure software, and customers now consider quality in terms of both functionality and security. Not surprisingly, this blog on the topic by our VP of Engineering Maria Loughlin garnered a lot of attention last year:

Software Quality Is a Competitive Differentiator

Security needs to expand its development knowledge

Security’s role is changing as DevOps models take hold. As security shifts left and moves into earlier phases of the development lifecycle, security teams need to work much more closely with development teams and, in turn, require more than a surface understanding of developers’ priorities and processes. This blog that outlines details of that understanding resonated with our readers this year:

Security: Here’s What You Need to Know About Development

Did you miss any of these posts last year? Don’t miss a thing in 2019; subscribe to our blog.

RSS | Veracode Blog

2018BlogMostPopularPostsRead

Click here now to visit our Shop!

Click here now to visit our Shop!

Other 2300 users like you have already done it this year!

Choose the product you need here!

  • THE FIRST TRUE ANDROID SMARTPHONE FOR HACKING WITHOUT ROOT UNIQUE IN THE WORLD WITH ALL THE APPS !!! 499,99€ 229,99€
  • HACKER LIBRARY THE LARGEST COLLECTION OF BOOKS AND MANUALS ON HACKING + 100 !!! 49,99€ 19,99€
  • HACK SOCIAL THE GUIDE TO HACK ALL THE SOCIAL ACCOUNTS 49,99€ 19,99€
  • HACKER PACK FOR YOUR SMARTPHONE AND YOUR TABLET WITH ROOT GUIDE AND + 100 PROGRAMS !!! 49,99€ 19,99€
  • THE FIRST TRUE ANDROID SMARTPHONE FOR HACKING UNIQUE IN THE WORLD WITH ALL THE APPS !!! 549,99€ 249,99€
  • HACKER PACK FOR YOUR COMPUTER AND NOTEBOOK + 1000 PROGRAMS 5 GB OF STUFF !!! 49,99€ 19,99€

Our customers say

Annabel M. – Systems Engineer

 
Samuel D. – Ethical Hacker

 
Karola M. – Influencer

 
Marcus P. – Private Investigator

 
Rosemary S. – Housewife

 
Amit V. – IT Consultant

 
Matthew C. – Entrepreneur

 
Aisha B. – Computer Science student

 
Li W. – IT Analyst

 
Robert C. – Programmer

 

DOWNLOADED 1316 TIMES!

DOWNLOADED 1316 TIMES!

Download now Hacker Secret our free Android app.

CONTACT US NOW FOR IMMEDIATE SUPPORT!

Contact Us
Write your email address here
Write here how we can help you - we support you immediately for all your needs!

## Are you looking for products for hacking, computer security and penetration testing? Do you need to clean up your smartphone, your PC or your site from viruses and malware? Do you need to track down someone or retrieve urgent information? Do you want to buy devices already configured to experiment all the hacking techniques quickly and easily? Do you have special needs in software or hardware? ##

Contact us now … another 2300 users like you have already done it this year!

Click here now!

 

Search on the site

Latest posts

  • How to tell if someone is stealing your wifi

  • How to check saved passwords on Chrome

  • The Computer Security Day

  • What is digital forensics

  • How to install Metasploit in Termux?

All the techniques, products and services described or contained on this site are intendend for exclusive use of study and professional training and to test the security of own's computer network in accordance with the national legislations on access to computer and online systems. All the services provided on this site (penetration testing, social accounts hardening, Incident Response & CSIRT, MSSP, Cybersecurity Consultancy, etc.) can be provided only with prior written and documented authorization from the owners or their legitimate representatives in accordance with current national regulations .

TOP