Visit HackEDU

HackEDU Blog

Stay up to date

Topic: Application Security

Secure Coding Training Secure Development Training Application Security

Apache Struts 2 Namespace (CVE-2018-11776) Vulnerability

Click here to try hacking the Struts 2 Vulnerability and learn more with HackEDU's hands-on Struts 2 application. Introduction On 22 August 2018, a Semmle security researcher disclosed a...

Continue Reading

Application Security Security Champion

How Do You Select Security Champions?

Security champions should be an integral part of your security team. When this position was first introduced five or so years ago as part of the cybersecurity structure, the security...

Continue Reading

Secure Coding Training Application Security

Top 6 Application Security Must Dos with Limited Resources

The vast majority of application security teams are under resourced. Application security teams should scale with development teams, but this rarely happens. So, given this disadvantage,...

Continue Reading

Secure Coding Training Application Security

OWASP Top 10 Mini Series - Command Injection

Introduction Command injection is similar to SQL injection, but instead of injecting into a SQL query, you are injecting a command into the Operating System. User data can be input to...

Continue Reading

Secure Coding Training Application Security

OWASP Top 10 Mini Series - SQL Injection

Introduction SQL Injection vulnerability allows attackers to alter database queries to take actions other than what the developer intended. This could allow an attacker to bypass...

Continue Reading

Application Security

When should I launch a bug bounty program?

Bug bounty programs - where individuals can receive recognition and compensation for reporting security vulnerabilities - are useful for organizations, especially when developing an...

Continue Reading

Stay up to date