In this article, Sonar's R&D team will provide an overview of content types and how a minor error resulted in a Cross-Site Scripting vulnerability in Odoo.
Preventing insider threats completely is not always possible, but organizations can minimize the risk and ensure operational resilience if a threat does occur.
This article will explain the steps to install a Public SSL certificate and how we can generate a wildcard certificate for our domain free of cost for a lifetime.
This article uncovers the reasons why hackers target personal computers and provide actionable tips on how to protect yourself from becoming their next victim
Explore a guide on mTLS authentication architecture, certificates, private and public key concepts, and how to enable mTLS using open-source Istio service mesh.
An ultimate guide to Secure Access Service Edge (SASE), a cloud-based solution that provides comprehensive protection and networking capabilities to businesses.
Recent data breaches across the enterprise have led to a new data security approach called 'DSPM.' But what is DSPM anyway, and what does it mean for the enterprise?
In this article, SonarSource's R and D team discusses how they discovered a code vulnerability that allows you to truncate arbitrary files to execute arbitrary commands!