![API Security: Best Practices for Python Developers - Part II](/content/images/size/w300/2024/05/24-06-11-blogpost-cover-vol2.png 300w,
/content/images/size/w600/2024/05/24-06-11-blogpost-cover-vol2.png 600w,
/content/images/size/w1000/2024/05/24-06-11-blogpost-cover-vol2.png 1000w,
/content/images/size/w2000/2024/05/24-06-11-blogpost-cover-vol2.png 2000w)
![API Security: Best Practices for Python Developers - Part II](/content/images/size/w300/2024/05/24-06-11-blogpost-cover-vol2.png 300w,
/content/images/size/w600/2024/05/24-06-11-blogpost-cover-vol2.png 600w,
/content/images/size/w1000/2024/05/24-06-11-blogpost-cover-vol2.png 1000w,
/content/images/size/w2000/2024/05/24-06-11-blogpost-cover-vol2.png 2000w)
![Why Dependency Security Is Your First Line of Defense Against Cyber Threats](/content/images/size/w300/2024/05/24-05-28_blogpost_cover_vol1.png 300w,
/content/images/size/w600/2024/05/24-05-28_blogpost_cover_vol1.png 600w,
/content/images/size/w1000/2024/05/24-05-28_blogpost_cover_vol1.png 1000w,
/content/images/size/w2000/2024/05/24-05-28_blogpost_cover_vol1.png 2000w)
Why Dependency Security Is Your First Line of Defense Against Cyber Threats
![Beginner’s Guide to Client Prototype Pollution vulnerabilities](/content/images/size/w300/2024/05/24-05-blogpost-cover-vol1.png 300w,
/content/images/size/w600/2024/05/24-05-blogpost-cover-vol1.png 600w,
/content/images/size/w1000/2024/05/24-05-blogpost-cover-vol1.png 1000w,
/content/images/size/w2000/2024/05/24-05-blogpost-cover-vol1.png 2000w)
Beginner’s Guide to Client Prototype Pollution vulnerabilities
![Pentesting Cross-Origin Resource Sharing (CORS) vulnerabilities](/content/images/size/w300/2024/04/blogpost_cover_vol1.png 300w,
/content/images/size/w600/2024/04/blogpost_cover_vol1.png 600w,
/content/images/size/w1000/2024/04/blogpost_cover_vol1.png 1000w,
/content/images/size/w2000/2024/04/blogpost_cover_vol1.png 2000w)
Pentesting Cross-Origin Resource Sharing (CORS) vulnerabilities
![State of Security Automation](/content/images/size/w300/2024/04/24-04-09-blogpost-cover-vol1.png 300w,
/content/images/size/w600/2024/04/24-04-09-blogpost-cover-vol1.png 600w,
/content/images/size/w1000/2024/04/24-04-09-blogpost-cover-vol1.png 1000w,
/content/images/size/w2000/2024/04/24-04-09-blogpost-cover-vol1.png 2000w)
State of Security Automation
![The Developer's Guide to Effective Secrets Management](/content/images/size/w300/2024/03/24-04-03-blogpost-cover-vol1.png 300w,
/content/images/size/w600/2024/03/24-04-03-blogpost-cover-vol1.png 600w,
/content/images/size/w1000/2024/03/24-04-03-blogpost-cover-vol1.png 1000w,
/content/images/size/w2000/2024/03/24-04-03-blogpost-cover-vol1.png 2000w)
The Developer's Guide to Effective Secrets Management
![API Security: Best Practices for Python Developers - Part I](/content/images/size/w300/2024/03/24-03-06_blogpost_cover_vol4.png 300w,
/content/images/size/w600/2024/03/24-03-06_blogpost_cover_vol4.png 600w,
/content/images/size/w1000/2024/03/24-03-06_blogpost_cover_vol4.png 1000w,
/content/images/size/w2000/2024/03/24-03-06_blogpost_cover_vol4.png 2000w)
API Security: Best Practices for Python Developers - Part I
![SAST vs. DAST: Choosing the Right Security Testing for Your Project](/content/images/size/w300/2024/03/24-03-14_blogpost_cover_vol_3.png 300w,
/content/images/size/w600/2024/03/24-03-14_blogpost_cover_vol_3.png 600w,
/content/images/size/w1000/2024/03/24-03-14_blogpost_cover_vol_3.png 1000w,
/content/images/size/w2000/2024/03/24-03-14_blogpost_cover_vol_3.png 2000w)
SAST vs. DAST: Choosing the Right Security Testing for Your Project
![AI Pentesting vs Automated Penetration Testing](/content/images/size/w300/2024/02/24-02-26_blogpost_cover.png 300w,
/content/images/size/w600/2024/02/24-02-26_blogpost_cover.png 600w,
/content/images/size/w1000/2024/02/24-02-26_blogpost_cover.png 1000w,
/content/images/size/w2000/2024/02/24-02-26_blogpost_cover.png 2000w)
AI Pentesting vs Automated Penetration Testing
![Why you never get Reflected XSS to execute: Balancing Payloads](/content/images/size/w300/2024/02/blogpost-cover1.png 300w,
/content/images/size/w600/2024/02/blogpost-cover1.png 600w,
/content/images/size/w1000/2024/02/blogpost-cover1.png 1000w,
/content/images/size/w2000/2024/02/blogpost-cover1.png 2000w)
Why you never get Reflected XSS to execute: Balancing Payloads
![AWS S3 Bucket Takeover - how to find it and maximize impact?](/content/images/size/w300/2024/01/24-01-10_Greg-Artyku-_Linkedin-1200-x-627px-2.png 300w,
/content/images/size/w600/2024/01/24-01-10_Greg-Artyku-_Linkedin-1200-x-627px-2.png 600w,
/content/images/size/w1000/2024/01/24-01-10_Greg-Artyku-_Linkedin-1200-x-627px-2.png 1000w,
/content/images/size/w2000/2024/01/24-01-10_Greg-Artyku-_Linkedin-1200-x-627px-2.png 2000w)
AWS S3 Bucket Takeover - how to find it and maximize impact?
![Security of new features in Next.js 14 - Server Actions, Taints](/content/images/size/w300/2023/10/dawid-twitt--7-.png 300w,
/content/images/size/w600/2023/10/dawid-twitt--7-.png 600w,
/content/images/size/w1000/2023/10/dawid-twitt--7-.png 1000w,
/content/images/size/w2000/2023/10/dawid-twitt--7-.png 2000w)