Blog

Cloud Security Term: Software Composition Analysis (SCA)

By Rajiv Thorat

Here we explain the term Software Composition Analysis.

How to Exploit Code Injection Vulnerabilities in Serverless Goat

By Andreas Dann

This article is part one of a series on how to prevent code injection attacks against Serverless applications using AWS Web application firewalls.

CodeShield Software Composition Analysis

By Andreas Dann

We just released our Software Composition Analysis feature that allows you to scan your Node.js and Java projects for CVEs.

Five Common Cloud Security Threats and Data Breaches

By Andreas Dann

In this article, we explain the term Infrastructure as Code (IaC)

CodeShield AWS Connector

By Andreas Dann

We just released our AWS connector feature that allows you to scan your complete cloud!

Cloud Security Term: Infrastructure as Code (IaC)

By Kaustubh Kelkar

In this article, we explain the term Infrastructure as Code (IaC)

CodeShield GitHub Connector - Early Access

By Andreas Dann

We just released a GitHub connector that allows you to scan your cloud-native repositories!

How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 2/2)

By Manuel Benz

This article is part two of a series on how to prevent code injection attacks against Serverless applications using AWS Web application firewalls.

How to Prevent Code Injection Vulnerabilities in Serverless Applications (Part 1/2)

By Manuel Benz

This article is part one of a series on how to prevent code injection attacks against Serverless applications using AWS Web application firewalls.

ServerlessGoat Java

By Andreas Dann

We released a- Java adaption of the OWASP Serverless Goat in our GitHub Repo.