Our website uses cookies to enhance your browsing experience.
Accept
to the top

Webinar: Let's make a programming language. Part 1. Intro - 20.02

>
>
Posts: #Security

Posts: # Security

Jan 19 2026
How to avoid losing your Minecraft server due to dangerous mods
Kirill Epifanov
I'm sure many Minecraft server owners have experienced players trying to hack into their server and give themselves administrator privileges. Of course, such behavior isn't limited to gaming, so...
...
Nov 26 2025
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?
Vladislav Bogdanov
What exactly is the Cyber Resilience Act? This article covers the regulation that establishes cybersecurity requirements for products sold in the European market. We'll discuss everything: from...
...
Subscribe to the newsletter
Want to receive a monthly digest of the most interesting articles and news? Subscribe!
Taint analysis in PVS-Studio C and C++ analyzer
Oleg Lisiy
Your code accepts external data? Congratulations, and welcome to the minefield! Any unchecked user input can lead to a vulnerability, and manually finding all the "tripwires" in a large project...
...
Oct 09 2025
Gadget chains in Java: how unsafe deserialization leads to RCE?
Vladislav Bogdanov
In this article, we'll explain what gadget chains are and look at examples (with schemas) of how careless deserialization with native Java mechanisms can lead to remote code...
...
Sep 16 2025
OWASP Top Ten 2021 explained with simple Java examples and SAST insights
Vladislav Bogdanov
In this article, we talk about the OWASP Top Ten 2021 categories through the lens of PVS-Studio Java analyzer warnings. So, if you want to peek at patterns of potential vulnerabilities in Java...
...
Mar 27 2025
Notepad injection or the story of writing new diagnostic rules
Vladislav Bogdanov
This article is about calling operating system commands in Java. Also, we'll cover OS command and argument injections, along with the process of writing diagnostic rules to detect...
...
Looking for potential vulnerabilities in code, part 2: practice
Konstantin Volohovsky
Last time, we discussed common approaches to detecting vulnerabilities in applications. This time, we'll take a more down-to-earth look at how we've implemented these mechanisms in our...
...
Jan 27 2025
Java, Taint, and SAST: What is it and why do we need it?
Vladislav Bogdanov
An enormous amount of server-side code is written in Java. So, web applications written in this language must be resistant to certain security vulnerabilities. This short article is about one of...
...
Looking for potential vulnerabilities in code, part 1: theory
Konstantin Volohovsky
We all know the risks that vulnerabilities pose: application crashes, data loss, or privacy breaches. In this article, we'll look at examples that illustrate the core aspects of an approach...
...
Jan 23 2024
Introducing SAST into the development process
Viktoria Pelipenko
Cyberattacks on applications are on the rise, and zero-day vulnerability exploitation is leading the way. Introducing SAST into the development process makes the product safer for users. However...
...
View more Pagination arrow previous
Showing: - of 60