Our website uses cookies to enhance your browsing experience.
Accept
to the top
>
>
Posts: #Security

Posts: # Security

Nov 26 2025
What is Cyber Resilience Act, and what cybersecurity requirements does it impose?
Vladislav Bogdanov
What exactly is the Cyber Resilience Act? This article covers the regulation that establishes cybersecurity requirements for products sold in the European market. We'll discuss everything: from...
...
Taint analysis in PVS-Studio C and C++ analyzer
Oleg Lisiy
Your code accepts external data? Congratulations, and welcome to the minefield! Any unchecked user input can lead to a vulnerability, and manually finding all the "tripwires" in a large project...
...
Subscribe to the newsletter
Want to receive a monthly digest of the most interesting articles and news? Subscribe!
Oct 09 2025
Gadget chains in Java: how unsafe deserialization leads to RCE?
Vladislav Bogdanov
In this article, we'll explain what gadget chains are and look at examples (with schemas) of how careless deserialization with native Java mechanisms can lead to remote code...
...
Sep 16 2025
OWASP Top Ten 2021 explained with simple Java examples and SAST insights
Vladislav Bogdanov
In this article, we talk about the OWASP Top Ten 2021 categories through the lens of PVS-Studio Java analyzer warnings. So, if you want to peek at patterns of potential vulnerabilities in Java...
...
Mar 27 2025
Notepad injection or the story of writing new diagnostic rules
Vladislav Bogdanov
This article is about calling operating system commands in Java. Also, we'll cover OS command and argument injections, along with the process of writing diagnostic rules to detect...
...
Looking for potential vulnerabilities in code, part 2: practice
Konstantin Volohovsky
Last time, we discussed common approaches to detecting vulnerabilities in applications. This time, we'll take a more down-to-earth look at how we've implemented these mechanisms in our...
...
Jan 27 2025
Java, Taint, and SAST: What is it and why do we need it?
Vladislav Bogdanov
An enormous amount of server-side code is written in Java. So, web applications written in this language must be resistant to certain security vulnerabilities. This short article is about one of...
...
Looking for potential vulnerabilities in code, part 1: theory
Konstantin Volohovsky
We all know the risks that vulnerabilities pose: application crashes, data loss, or privacy breaches. In this article, we'll look at examples that illustrate the core aspects of an approach...
...
Jan 23 2024
Introducing SAST into the development process
Viktoria Pelipenko
Cyberattacks on applications are on the rise, and zero-day vulnerability exploitation is leading the way. Introducing SAST into the development process makes the product safer for users. However...
...
May 31 2023
XSS vulnerability in the ASP.NET application: examining CVE-2023-24322 in mojoPortal CMS
Sergey Vasiliev
In this article, we will thoroughly examine the XSS vulnerability in a CMS written in C#. Let's recall the theory, figure out how the security defect looks from a user's perspective and in code...
...
View more Pagination arrow previous
Showing: - of 59