Tag

vulnerability scanning

1 views collected around this technical thread.

Linux Ops Smart Journey
Linux Ops Smart Journey
Aug 27, 2024 · Information Security

Secure Your Container Images: Integrate Trivy Scanning into Harbor

This guide explains how to secure container images by integrating the Trivy vulnerability scanner into the Harbor registry, covering Helm configuration, offline database setup, automated updates via cron, verification steps, and useful references for a robust cloud‑native security workflow.

Container SecurityHarborHelm
0 likes · 7 min read
Secure Your Container Images: Integrate Trivy Scanning into Harbor
Linux Ops Smart Journey
Linux Ops Smart Journey
Aug 26, 2024 · Information Security

How to Secure Container Images: Integrating Trivy with Harbor for Seamless Vulnerability Scanning

This guide explains why container image security matters, details the Trivy toolchain, shows step‑by‑step how to install Trivy, scan images, obtain offline vulnerability and Java index databases, and verify scans, preparing you to integrate Trivy with Harbor for a safer CI/CD pipeline.

Cloud NativeContainer SecurityHarbor
0 likes · 11 min read
How to Secure Container Images: Integrating Trivy with Harbor for Seamless Vulnerability Scanning
Laravel Tech Community
Laravel Tech Community
Aug 2, 2023 · Information Security

Top Open Source Vulnerability Scanners of 2023: Features, Pros, and Cons

This article reviews the best open‑source vulnerability scanners for web applications, databases, and infrastructure in 2023, detailing each tool’s key features, advantages, disadvantages, and guidance on who should or should not use them.

Cloud SecurityDevOpsInformation Security
0 likes · 18 min read
Top Open Source Vulnerability Scanners of 2023: Features, Pros, and Cons
DevOps Cloud Academy
DevOps Cloud Academy
Mar 14, 2022 · Information Security

Integrating Trivy Vulnerability Scanner with GitLab CI/CD Pipelines

This article explains what Trivy is, how to install and use it for container vulnerability scanning, demonstrates saving results in JSON, and provides a step‑by‑step guide to integrating Trivy into a GitLab CI/CD pipeline with example configuration and troubleshooting tips.

Container SecurityDockerGitLab CI
0 likes · 7 min read
Integrating Trivy Vulnerability Scanner with GitLab CI/CD Pipelines
Dada Group Technology
Dada Group Technology
Jul 16, 2021 · Information Security

Application Security Testing Practices and Risk Assessment at JD Daojia

This article outlines JD Daojia's comprehensive application security strategy, including risk analysis, threat modeling, DevSecOps processes, open‑source component scanning, SAST/DAST/IAST testing, manual security assessments, and evaluation of testing effectiveness to mitigate vulnerabilities before production.

DevSecOpsSecurity TestingThreat Modeling
0 likes · 13 min read
Application Security Testing Practices and Risk Assessment at JD Daojia
Architects Research Society
Architects Research Society
Aug 9, 2020 · Information Security

Understanding Open Source Software Dependency Security Risks and Available Tools

The article explains how the widespread use of third‑party open‑source components creates a large, often overlooked attack surface, describes the fragmented nature of vulnerability information, and reviews a variety of tools that help organizations detect and manage security risks in their software dependencies.

Information SecuritySoftware Securitydependency management
0 likes · 12 min read
Understanding Open Source Software Dependency Security Risks and Available Tools
Architects Research Society
Architects Research Society
Aug 6, 2020 · Information Security

SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies

This article examines the prevalence of SQL injection attacks, presenting Imperva’s recent statistics, common attack vectors, real-world examples, and practical defenses such as prepared statements, input sanitization, and web application firewalls, while also offering Python code illustrations of secure and insecure database queries.

PythonSQL injectionWeb Security
0 likes · 11 min read
SQL Injection Attacks: Statistics, Real‑World Examples, and Protection Strategies
360 Quality & Efficiency
360 Quality & Efficiency
Nov 15, 2019 · Information Security

Improving Product Quality through Code Vulnerability Inspection and Deep Code‑Search Techniques

The article explains how static source‑code scanning, binary analysis, and advanced code‑search technologies—including incremental indexing, deduplication, real‑time Sphinx indexing, and BM25 ranking—can be combined to detect and remediate product‑level vulnerabilities early, thereby significantly raising software quality and reducing risk.

BM25Code SecuritySphinx
0 likes · 13 min read
Improving Product Quality through Code Vulnerability Inspection and Deep Code‑Search Techniques
Architects Research Society
Architects Research Society
Jul 17, 2019 · Information Security

Understanding Open‑Source Dependency Security Risks and Available Scanning Tools

This article explains why open‑source components constitute a major attack surface, outlines the fragmented nature of vulnerability information, debunks the myth that open‑source code is inherently safer, and reviews a range of tools—both open‑source and commercial—that help organizations detect and manage security risks in software dependencies.

Information SecuritySoftware Securitydependency management
0 likes · 11 min read
Understanding Open‑Source Dependency Security Risks and Available Scanning Tools
360 Tech Engineering
360 Tech Engineering
May 31, 2019 · Information Security

Dynamic Web Crawling Techniques for Vulnerability Scanning with Pyppeteer

This article details the practical implementation of a dynamic web crawler for vulnerability scanning, covering Chrome headless setup, browser initialization, JavaScript hook injection for DOM events, navigation locking, form handling, link collection, deduplication, and task scheduling using pyppeteer.

Dynamic Analysisbrowser-automationjavascript hooking
0 likes · 30 min read
Dynamic Web Crawling Techniques for Vulnerability Scanning with Pyppeteer
Ctrip Technology
Ctrip Technology
Jul 6, 2017 · Information Security

Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project

This article describes Ctrip's automated web vulnerability detection system, detailing the shift from active to passive scanning, the distributed architecture using traffic mirroring, message queues, Redis, and MySQL, and the processes for data collection, de‑duplication, scanning, and vulnerability management.

CtripInformation SecurityWeb Security
0 likes · 8 min read
Automating Web Vulnerability Detection at Ctrip: Architecture and Implementation of the Hulk Project
Efficient Ops
Efficient Ops
Feb 20, 2017 · Information Security

Inside YY's Security Ops: Real-World Incident Stories and Architecture

This article shares YY's security operations journey, detailing real incident response scenarios, the evolution of their security infrastructure from 2012 onward, and the key factors considered when building a robust security ops system, including DDoS protection, WAF, vulnerability scanning, intrusion detection, and data‑driven automation.

DDoS protectionIncident Responsebig data analytics
0 likes · 24 min read
Inside YY's Security Ops: Real-World Incident Stories and Architecture
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 23, 2016 · Information Security

Testing HTTP Header Parameters for SQL Injection: Coverage, Tools, and Best Practices

The article examines how HTTP header and cookie parameters can serve as SQL injection vectors, evaluates the coverage of commercial and open‑source web vulnerability scanners, demonstrates manual testing techniques, and recommends tools such as sqlmap for comprehensive security assessments.

SQL injectionWeb Securitycookies
0 likes · 13 min read
Testing HTTP Header Parameters for SQL Injection: Coverage, Tools, and Best Practices