Karan Preet Singh Sasan
Karan Preet Singh Sasan @sasan_karan ·
🚀 Announcing OWASP VulnerableApp 2.0.0 📷 We’re excited to share that VulnerableApp-2.0.0 has just been released! github.com/SasanLabs/Vuln…I3H #OpenSource #AppSec #SecurityTesting #DevSecOps #VulnerableApp #OWASP #SasanLabs #AI #LLMSecurity
Release 🚀 VulnerableApp Release v2.0.0 · SasanLabs/VulnerableApp

This release introduces major enhancements to VulnerableApp, including the addition of LLM-focused security labs, new vulnerabilities, and improvements across the platform. 🔥 Highlights 🤖 Introdu...

From github.com
14
SecretNotes/Pro
SecretNotes/Pro @SecretNotesPro ·
Why HMAC-SHA256 instead of === ? === stops at the first wrong char. Fast fail = timing attack vector. HMAC + timingSafeEqual: every comparison takes identical time. Microseconds matter in security. #AppSec #InfoSec #DevTips
6
Audn AI
Audn AI @audn_ai ·
We just let an AI generate shellcode for a known ransomware sample and it outperformed our handcrafted payloads, does that mean the next wave of malware will be AI-born? Share your thoughts 🧠 #appsec #malware #AIsecurity
19
JTCrawford
JTCrawford @JtCrawford ·
Security researchers scanned 10M websites and found nearly 2,000 exposed API keys—valid credentials left in public code. Basic hygiene failures at scale. If your threat model doesn't include developer discipline, you don't have a threat model. #CyberSecurity #AppSec
7
Audn AI
Audn AI @audn_ai ·
We see generative AI code reviewers becoming the new first line of defense in appsec, but only if enterprises embed them into CI pipelines with strict prompt controls; otherwise they become another attack surface 🚀 #enterprisesecurity #appsec #generativeAI
11
CVERiskPilot
CVERiskPilot @cveriskpilot ·
Your scanner found 8,000 CVEs. Cool. Which ones have active exploits? Which ones are in CISA KEV? Which ones actually hit your stack? That's what CVERiskPilot answers. Just migrated to GCP — alpha phase on new infra. Moving fast. #CVERiskPilot #AppSec #VulnerabilityManagement
13
XHack
XHack @xhackio ·
Ever wonder why parameterized queries are your first line of defense against SQL injection? It's because they separate SQL code from user data, preventing attackers from manipulating your queries. Always use them over string concatenation! #appsec #OWASP #cybersecurity
20
Xygeni
Xygeni @xygeni ·
Most tools look for CVEs, signatures, hashes. Modern malware doesn’t. It hides in deps, CI/CD, build scripts… and runs at runtime. 👉 No CVE. No alert Better question: What is this code doing when it runs? Read more →xygeni.io/blog/ai-powere…X #AppSec #DevSecOps #CyberSecurity
AI-Powered Malware Detection in SSCS | Xygeni

AI-powered malware detection stops ai malware through behavioral analysis and protects code, dependencies, and CI/CD pipelines.

From xygeni.io
32
Audn AI
Audn AI @audn_ai ·
We see the next wave of zero-day hunts shifting from monolithic codebases to serverless functions, and OpenClaw's auto-scanner will become the de facto standard for runtime fuzzing. Agree? 🤔 #vulnerability #appsec #OpenClaw
20
ZeroThreat.ai
ZeroThreat.ai @ZeroThreat_ZT ·
Security testing is stuck in 2015. Modern apps = APIs, SPAs, complex flows. Most tools = static scans, no real attack paths. Meet Agentic AI Pentesting by ZeroThreat. Find → Exploit → Prove. Real risk. No noise. Try: zurl.co/ajAXp #AppSec #DevSecOps #AI
27
CVERiskPilot
CVERiskPilot @cveriskpilot ·
Migrating CVERiskPilot to GCP — Cloud Run, Cloud SQL, Cloud Armor WAF, and KMS encryption at rest. Faster scans. Stronger security posture. Enterprise-grade infra for enterprise-grade vuln management. #CVERiskPilot #AppSec #DevSecOps #GCP
31
Arnold Mavhezha | Offensive Security
Arnold Mavhezha | Offensive Security @arnold_mavhezha ·
I used to write SQL queries. Now I break them. New blog: Developer Brain → Attacker Eyes (SQL Injection) • How devs accidentally create vulnerabilities • How attackers actually think 🔗mavhezha.com/blog/developer…e #CyberSecurity #AppSec #Pentesting #SQLInjection #OffensiveSecurity #OffSec
Arnold Mavhezha — offensive security engineer
I Wrote This Bug. Then I Exploited It.

A developer's guide to SQL injection from both sides of the keyboard. Series: Developer Brain, Attacker Eyes.

From mavhezha.com
22
LandingRoles
LandingRoles @landingroles ·
Airtable is hiring Product Security Engineer — Remote Up to $277K Build automated security frameworks for JS/TS apps, securing AI/ML integrations and multi-tenant architectures. Link in reply. #productsecurity #appsec #javascript
2
53
securelic
securelic @securelic ·
Don’t just scan attack your own app before attackers do. Learn how OWASP ZAP Active Scanning simulates real-world attacks to uncover critical vulnerabilities like SQLi & XSS. ⚡ Proactive defense starts here: securelic.com/blog/proactive… #CyberSecurity #OWASPZAP #AppSec #PenTesting #Securelic
OWASP ZAP Active Scan: Proactive Vulnerability Detection Guide

Go beyond observation. Learn how OWASP ZAP Active Scan uses automated attacks to find SQLi, XSS and more. Secure your B2B SaaS with proactive DAST.

From securelic.com
1
26
CVERiskPilot
CVERiskPilot @cveriskpilot ·
CVERiskPilot Beta 2.0.2 shipped. XLSX CVE patched. SOC2 audit events wired for session revoke, billing override, and webhook bypass. Security boundaries hardened. npm audit --omit=dev is at 0 high/critical. Building in public. #AppSec #SOC2 #DevSecOps
1
65