Appsec Knowledge Base search Results

167 Results For : All Records
Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone. Learn how Veracode can help.
Learn how to prevent Man-in-the-middle (MITM) attacks, where a malicious actor goes between two parties & gains access to private information.
With automated software testing tools, Veracode simplifies testing of microservices and enables development teams to deliver more secure code more easily.
Mobile app security testing has become a critical part of protecting users and organizations from cyber attacks that exploit vulnerabilities in mobile apps.
The right mobile app testing solutions can help reduce cost and speed development. Learn more about the benefits of testing and how Veracode can help.
The category of mobile security vulnerabilities are errors in design or implementation that expose the mobile device data to interception and retrieval by attackers.
Network security tools are designed to protect the network perimeter from viruses, worms, DDoS attacks and other threats.
Achieve NIST 800-37 and 800-53 compliance with scalable and automated application security for web, mobile and third-party apps.
While open source software offers many benefits to enterprises and development teams, open source vulnerabilities pose significant risks to application security.
Learn what OS Command Injection attacks are and how they work. Resources for preventing OS Command Injection from occurring in your applications.