Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java

Deserialization vulnerabilities in Java Understanding serialization and deserialization vulnerabilities is the first step toward building secure applications. For most developers, it’s a challenge to find the right balance between coding securely and meeting other...
JWT handling best practices

JWT handling best practices

JWT handling best practices Máté Simon-Takács (Content developer, Avatao) JWT, short for JSON web tokens, is a popular method for managing user authorization and authentication in web applications. It is designed for allowing parties to transmit information securely....
Ruby needs security

Ruby needs security

Ruby needs security Máté Simon-Takács (Content developer, Avatao) Ruby was created by Japanese developer Yukihiro Matsumoto in the mid-1990s and has since become one of the top ten most commonly used programming languages. The main goal of the project was to create a...
Python best practices and common issues

Python best practices and common issues

Python best practices and common security issues Gergő Turcsányi (Software Engineer, Avatao) ​Python is a high-level, flexible programming language that offers some great features. To be as effective as possible, it is important to possess the knowledge to make the...
5 Steps your security program should include

5 Steps your security program should include

5 Steps your security program should include Márk Félegyházi (Avatao CEO) For most companies, security is considered a side quest, which is partly related to the daily processes. In reality, security ought to be a strong foundation of any organization. To ensure the...