
Would you like to know how mature your #AppSec program is? Please take my survey to receive a target report based on your answers of how to level up your program—no matter your current maturity level.
https://semgrep.dev/blog/2025/maturing-your-application-security-program-survey/
*Report is free, but you join the Semgrep newsletter.
Would you like to know how mature your #AppSec program is? Please take my survey to receive a target report based on your answers of how to level up your program—no matter your current maturity level.
https://semgrep.dev/blog/2025/maturing-your-application-security-program-survey/
*Report is free, but you join the Semgrep newsletter.
Get ready for an exhilarating time at #OWASP Global #AppSec EU this May! Imagine navigating between sessions, connecting with peers over coffee... Why not enhance your experience by becoming a Mentor? Sign up here: https://owasp.wufoo.com/forms/zk2cdkr1qla6o8/ #CyberSecurity #AI #threatmodeling #infosec #devsecops
The @zaproxy team did some stuff in March You can get the details here:
https://www.zaproxy.org/blog/2025-04-02-zap-updates-march-2025/
Ready to shine on stage?
Share your expertise at #OWASP Global #AppSec USA in Washington, DC this November! Submit your presentations now for this incredible event! Seize the opportunity - apply here: https://sessionize.com/owasp-global-appsec-USA-2025-cfp2/
#infosec #AI #devsecops #SBOMM
Some of my colleagues at #AWS have created an open-source serverless #AI assisted #threatmodel solution. You upload architecture diagrams to it, and it uses Claude Sonnet via Amazon Bedrock to analyze it.
I'm not too impressed with the threats it comes up with. But I am very impressed with the amount of typing it saves. Given nothing more than a picture and about 2 minutes of computation, it spits out a very good list of what is depicted in the diagram and the flows between them. To the extent that the diagram is accurate/well-labeled, this solution seems to do a very good job writing out what is depicted.
I deployed this "Threat Designer" app. Then I took the architecture image from this blog post and dropped that picture into it. The image analysis produced some of the list of things you see attached.
This is a specialized, context-aware kind of OCR. I was impressed at boundaries, flows, and assets pulled from a graphic. Could save a lot of typing time. I was not impressed with the threats it identifies. Having said that, it did identify a handful of things I hadn't thought of before, like EventBridge event injection. But the majority of the threats are low value.
I suspect this app is not cheap to run. So caveat deployor.
#cloud #cloudsecurity #appsec #threatmodeling
Everyone knows all the apps on your phone A case study looking at #Indian Apps on #Android phones. #SmartPhones #privacy #india #surveillance #DataPrivacy #DataProtection #DataSecurity #software #Apps #AppSec #AppDev
https://peabee.substack.com/p/everyone-knows-what-apps-you-use
Space is filling up fast! Secure your expo spot at #OWASP Global AppSec US DC before it’s too late! http://dc.globalappsec.org/ #appsec #developers #cybersecurity
Legit Announces New Vulnerability Prevention Capabilities – Source: securityboulevard.com https://ciso2ciso.com/legit-announces-new-vulnerability-prevention-capabilities-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard #BestPractices #CISOSuite #AppSec #DevOps #legit #CISO
We are excited to welcome aboard @BDOGlobal as #OWASP's newest Gold Corporate Supporter! Thank you for your generous support. We look forward to collaborating with your team this year! https://owasp.org/supporters/list #appsec
Our second part of the “Diving Into JumpServer” series is live:
Read more on how an attacker who bypassed authentication can execute code and fully compromise the JumpServer instance and internal hosts:
With #CVE_2025_29927, Next.js has now suffered its second major vulnerability in just three months, following #CVE_2024_51479.
I originally built CVE Crowd with #NextJS.
However, as the application became more complex (especially with authentication), I decided to switch to a framework I was more familiar with.
Honestly, I’m feeling a bit relieved about that right now...
Compromising bastion host to gain full control over the internal infrastructure.
Read more about the vulnerabilities we uncovered in JumpServer in our recent blog post:
Hivemind:
Roll your own SAML (like, no IdP)?