Visit HackEDU

HackEDU Blog

Stay up to date

Topic: Secure Coding Training

Secure Coding Training Secure Development Training Application Security

Apache Struts 2 Namespace (CVE-2018-11776) Vulnerability

Click here to try hacking the Struts 2 Vulnerability and learn more with HackEDU's hands-on Struts 2 application. Introduction On 22 August 2018, a Semmle security researcher disclosed a...

Continue Reading

HackEDU Secure Coding Training Secure Development Training

HackEDU Partners with HackerOne to Expand Hacker101 Training

HackerOne, the leading hacker-powered security platform, today announced the expansion of its free online hacker training program, Hacker101 through a partnership with interactive...

Continue Reading

Secure Coding Training Secure Development Training

Software Developer Accountability

Many of our customers have used other secure development training in the past. One of the biggest complaints we hear is that developers just click through the slides or fast forward the...

Continue Reading

HackEDU Secure Coding Training Secure Development Training

Public Vulnerability Sandboxes

HackEDU has added a new Public Vulnerabilities offering to enhance the training experience. Public vulnerabilities are sandboxes with vulnerabilities that have been disclosed in popular...

Continue Reading

Secure Coding Training Application Security

Top 6 Application Security Must Dos with Limited Resources

The vast majority of application security teams are under resourced. Application security teams should scale with development teams, but this rarely happens. So, given this disadvantage,...

Continue Reading

Secure Coding Training Application Security

OWASP Top 10 Mini Series - Command Injection

Introduction Command injection is similar to SQL injection, but instead of injecting into a SQL query, you are injecting a command into the Operating System. User data can be input to...

Continue Reading

Secure Coding Training Application Security

OWASP Top 10 Mini Series - SQL Injection

Introduction SQL Injection vulnerability allows attackers to alter database queries to take actions other than what the developer intended. This could allow an attacker to bypass...

Continue Reading

Secure Coding Training Secure Development Training

Compare Codebashing vs. HackEDU

HackEDU customers often ask us, “What is the difference between Codebashing and HackEDU?” This is a very good question because both Codebashing and HackEDU offer similar training products,...

Continue Reading

Secure Coding Training Secure Development Training

Why an Offensive Approach to Security Training is Effective

There is a saying in security that defenders have to be right 100% of the time, but attackers only have to be right once. While this may be an oversimplification, it illustrates that...

Continue Reading

Secure Coding Training Secure Development Training

How Much Should I Spend on Secure Coding Training?

Customers come to us at HackEDU and ask “How much should I spend on Secure Coding Training?” This is a very good question - we can certainly understand the need to know how much to spend...

Continue Reading

Stay up to date