Tagged articles
18 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 23, 2026 · Information Security

How AI Is Redefining Security Engineer Training: From Code Review to Threat Modeling

In the AI‑driven development era, CISOs must overhaul security engineer training by shifting focus from line‑by‑line code review to result‑based evaluation, embedding threat‑modeling skills, and integrating continuous, tool‑chain‑embedded guardrails to keep pace with rapid, AI‑augmented code delivery.

AICISODeveloper Training
0 likes · 8 min read
How AI Is Redefining Security Engineer Training: From Code Review to Threat Modeling
大转转FE
大转转FE
Aug 19, 2025 · Frontend Development

Essential Frontend Security: Defend Against CSRF, XSS, and Clickjacking

This article explains why frontend security is critical, outlines common attacks such as CSRF, XSS (stored, reflected, DOM), and clickjacking, and provides practical defense strategies including CSRF tokens, SameSite cookies, input validation, CSP, X‑Frame‑Options, and secure coding practices for modern web developers.

CSRFSecure CodingWeb Security
0 likes · 12 min read
Essential Frontend Security: Defend Against CSRF, XSS, and Clickjacking
21CTO
21CTO
Jul 21, 2025 · Artificial Intelligence

Why AI Skills Are Now a Must-Have for Developers in 2025

According to a 2025 application development trends report by Infragistics and Dynata, 71% of tech leaders will not hire developers lacking AI/ML skills, while 87% already use AI in development, highlighting the growing demand for AI, cloud, and secure coding expertise amid hiring and security challenges.

Secure Codingartificial intelligencedeveloper hiring
0 likes · 4 min read
Why AI Skills Are Now a Must-Have for Developers in 2025
Selected Java Interview Questions
Selected Java Interview Questions
Jan 12, 2025 · Information Security

Encrypting and Dynamically Decrypting Spring Boot JAR Files for Secure Deployment

This article demonstrates a practical approach to protect sensitive Spring Boot applications by encrypting the JAR with AES, storing the key in a secure vault, and using a custom ClassLoader to decrypt and load classes at runtime, while highlighting key management, performance, and additional hardening considerations.

AESJAR encryptionJava
0 likes · 8 min read
Encrypting and Dynamically Decrypting Spring Boot JAR Files for Secure Deployment
php Courses
php Courses
Nov 15, 2024 · Information Security

Best Practices for Securing PHP Applications

This guide outlines comprehensive, actionable steps for PHP developers to build secure applications by using the latest PHP version, enforcing HTTPS, sanitizing input, managing passwords, preventing XSS and CSRF, handling sessions, logging errors, securing file uploads, and applying the principle of least privilege.

Backend DevelopmentPHPSecure Coding
0 likes · 10 min read
Best Practices for Securing PHP Applications
21CTO
21CTO
Oct 16, 2024 · Information Security

Will Safe C++ Extensions Make C++ Memory‑Safe? Insights from Rust and NSA

Amid rising memory‑safety concerns highlighted by Chrome’s vulnerabilities and high‑profile attacks, the C++ community proposes a Safe C++ Extension to add memory‑safety features, while experts compare it to Rust and discuss challenges, adoption pressures, and DARPA’s AI‑driven code‑conversion efforts.

C++Memory SafetyRust
0 likes · 6 min read
Will Safe C++ Extensions Make C++ Memory‑Safe? Insights from Rust and NSA
21CTO
21CTO
Feb 29, 2024 · Information Security

Why the White House Wants Developers to Abandon C and C++ for Memory‑Safe Languages

The White House’s ONCD report urges developers to replace C and C++ with memory‑safe languages like Rust, Go, and Java, citing alarming vulnerability statistics and a strategic shift that moves software‑security responsibility from individuals to large organizations and the federal government.

C++Government policyMemory Safety
0 likes · 8 min read
Why the White House Wants Developers to Abandon C and C++ for Memory‑Safe Languages
Sohu Tech Products
Sohu Tech Products
Dec 20, 2023 · Information Security

Command Injection Vulnerabilities in Node.js: Analysis and Prevention

The article examines how command‑injection flaws in popular Node.js npm packages such as find‑exec and fs‑git arise from unsafe concatenation of user input into shell commands, and recommends rigorous validation, using execFile or spawn, and regular dependency audits to prevent catastrophic system compromise.

CVECommand InjectionSecure Coding
0 likes · 11 min read
Command Injection Vulnerabilities in Node.js: Analysis and Prevention
Sohu Tech Products
Sohu Tech Products
Oct 19, 2022 · Information Security

Secure Software Development: SDL, Tool Configurations, and Safe Coding Practices

This article outlines essential practices for secure software development, covering Microsoft's Security Development Lifecycle, Visual Studio security features, and comprehensive secure coding guidelines—including safe APIs, SafeInt library usage, trust boundaries, type casting, and file operation safeguards—to reduce vulnerabilities such as buffer overflows and memory errors.

CSDLSecure Coding
0 likes · 10 min read
Secure Software Development: SDL, Tool Configurations, and Safe Coding Practices
21CTO
21CTO
Apr 15, 2021 · Information Security

Essential Secure Coding Practices Every Developer Should Follow

This article presents practical secure coding guidelines—including input escaping, avoiding auto‑increment IDs, minimalist HTTP methods, least‑privilege design, mandatory HTTPS, strong encryption algorithms, and whitelist‑based execution—to help developers embed real‑time security into modern software.

HTTPSSQL injectionSecure Coding
0 likes · 7 min read
Essential Secure Coding Practices Every Developer Should Follow
21CTO
21CTO
Dec 31, 2020 · Information Security

Which Languages Have the Worst Security Bugs? Veracode’s Latest Report

Veracode’s State of Software Security Volume 11 reveals that, among popular languages, C++ and PHP suffer the most severe vulnerabilities, while JavaScript and Python see rising issues, highlighting the need for developers to prioritize secure coding practices, regular updates, and careful management of third‑party dependencies.

Secure CodingSoftware SecurityVeracode
0 likes · 7 min read
Which Languages Have the Worst Security Bugs? Veracode’s Latest Report
Architects Research Society
Architects Research Society
Jul 8, 2020 · Information Security

Top 25 Software Errors (CWE) and Resources for Mitigation

The article presents the CWE Top 25 software errors, detailing each weakness with its ID and description, and provides links to MITRE entries, remediation guidance, and various SANS training resources aimed at helping developers mitigate these common vulnerabilities.

CWEMitigationSANS
0 likes · 17 min read
Top 25 Software Errors (CWE) and Resources for Mitigation
MaGe Linux Operations
MaGe Linux Operations
Jun 24, 2018 · Information Security

Top 10 Python Security Pitfalls and How to Fix Them

Discover the ten most common Python security flaws—from input injection and XML parsing attacks to unsafe assert statements and vulnerable third‑party packages—and learn practical remediation techniques such as using ORM safeguards, defusedxml, safe YAML loading, secrets.compare_digest, and proper dependency management.

Secure CodingSecuritybest practices
0 likes · 10 min read
Top 10 Python Security Pitfalls and How to Fix Them
Architects Research Society
Architects Research Society
Nov 24, 2015 · Information Security

Understanding Common Web Application Attacks and the OWASP Top 10

The article explains how modern web and cloud‑based applications are increasingly exposed to a range of application‑layer attacks—including injection, XSS, broken authentication, and insecure redirects—while highlighting OWASP’s Top 10 list, the importance of secure development practices, and IBM’s educational webinar series.

OWASPSecure CodingWeb Security
0 likes · 10 min read
Understanding Common Web Application Attacks and the OWASP Top 10