Avatao Blog
Cybersecurity best practices, tips, and the latest news discussed by security professionals.
Read on to find the topic that interests you the most!
Featured article

Deserialization vulnerabilities in Java
Reading Time: 9 minutes Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other objectives like tight deadlines. This often results in products that are vulnerable to deserialization attacks which would be otherwise difficult to stage.
Latest posts
Deserialization vulnerabilities in Java
Reading Time: 9 minutes Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other objectives like tight deadlines. This often results in products that are vulnerable to deserialization attacks which would be otherwise difficult to stage.
JWT handling best practices
Reading Time: 8 minutes The purpose of this post is to present one of the most popular authorization manager open standards JWT. It goes into depth about what JWT is, how it works, why it is secure, and what the most common security pitfalls are.
Interview with Christian Martorella, Skyscanner
Reading Time: 8 minutes Software development and application security go hand-in-hand. We asked the CISO of Skyscanner about this crucial relationship.
Ruby needs security
Reading Time: 10 minutes Every year, Ruby is becoming more and more popular thanks to its elegance, simplicity, and readability. Security, however, is an issue we can’t afford to neglect.
Understanding the importance of vulnerability management
Reading Time: 8 minutes New security vulnerabilities are discovered every day. The common goal of everyone, including attackers, is to detect these security vulnerabilities.
Interview with Gábor Molnár, Google
Reading Time: 6 minutes Being up-to-date with the latest information security trends is not easy. Deploying them on a regular basis is even harder. We asked an expert for best practices!
Cybernews: Interview with Márk Félegyházi, Avatao
Reading Time: 8 minutes Cybernews asked our CEO Mark about the importance of secure coding training, current security challenges, and more!
Source code under attack: the Samsung breach
Reading Time: 10 minutes The hacker group Lapsus$ claims to have breached Samsung and stolen 190GB of data, including the source code. Here is everything you need to know!
Zero trust security
Reading Time: 9 minutes Zero Trust is a security framework requiring all users, whether inside or outside your organization, to be authenticated, authorized, and continuously validated. This allows for security configuration to happen before granting or keeping access to applications or data.
Learn more about our secure coding training
