Lars (@bob5ec) 's Twitter Profile
Lars

@bob5ec

#LangSec conspirator eleminating injection vulnerabilities, #DevSecOps practitioner authoring #SecurityBelts and #ThreatModeling security architecture.

ID: 456772197

linkhttps://github.com/AppSecure-nrw/security-belts calendar_today06-01-2012 16:56:53

1,1K Tweet

213 Followers

313 Following

Tanya Janca | Shehackspurple (@shehackspurple) 's Twitter Profile Photo

I'm a proud sponsor of LocoMocoSec: Hawaiʻi Security Conference! Please apply for the call for papers, open until March 31. Ladies and non-binary folks, this includes YOU! Everyone should apply! sessionize.com/loco-moco-secu…

I'm a proud sponsor of <a href="/LocoMocoSec/">LocoMocoSec: Hawaiʻi Security Conference</a>! Please apply for the call for papers, open until March 31. Ladies and non-binary folks, this includes YOU! Everyone should apply!
sessionize.com/loco-moco-secu…
Devansh (⚡, 🥷) (@0xasm0d3us) 's Twitter Profile Photo

If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇

If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇
Abhay Bhargav (@abhaybhargav) 's Twitter Profile Photo

An underrated aspect of AppSec and Secure Coding is not exposing the insecure functionality in the first place. Let's say you have a XML parsing library that may be used by devs wrongly/insecurely. By disabling certain functions in the library, its not vulnerable to XML

TROOPERS Conference (@wearetroopers) 's Twitter Profile Photo

We just published an almost complete list of talks that have been accepted for #TROOPERS24. Thanks to all of you who participated in the CFP! So many excellent submissions. We really had a hard time to decide which will fit best for this year! troopers.de/troopers24/tal…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🤖 Building an AI AppSec Team Using CrewAI to create a multi-agent AppSec team * Code reviewer * Exploiter * Mitigation expert * Report writer #cybersecurity srajangupta.substack.com/p/building-an-…

🤖 Building an AI AppSec Team

Using <a href="/crewAIInc/">CrewAI</a> to create a multi-agent AppSec team

* Code reviewer
* Exploiter
* Mitigation expert
* Report writer

#cybersecurity

srajangupta.substack.com/p/building-an-…
Rami McCarthy (@ramimacisabird) 's Twitter Profile Photo

I just launched a new post with Clint Gibler over on tl;drsec, check it out! When I read Wiring the Winning Organization (Gene Kim, Steven Spear), I spent the whole time trying to map the concepts to Security 1/2

I just launched a new post with <a href="/clintgibler/">Clint Gibler</a> over on tl;drsec, check it out!

When I read Wiring the Winning Organization (<a href="/RealGeneKim/">Gene Kim</a>, <a href="/StevenJSpear/">Steven Spear</a>), I spent the whole time trying to map the concepts to Security

1/2
I Am Devloper (@iamdevloper) 's Twitter Profile Photo

There should be a reality show where project managers try to meet outrageous deadlines while developers keep introducing new features.

Lars (@bob5ec) 's Twitter Profile Photo

For everyone who is improving security culture, ui-patterns.com might be an awesome source of inspiration for fundamental patterns that can be applied.

Tanya Janca | Shehackspurple (@shehackspurple) 's Twitter Profile Photo

Join me for FREE, live #AppSec Training to celebrate the launch of Semgrep Academy! academy.semgrep.dev 🚀 🔒 Building an Application Security Program June 20: Level 3 Register: ow.ly/puGP50RgpiC

Join me for FREE, live #AppSec Training to celebrate the launch of <a href="/Semgrep/">Semgrep</a> Academy! academy.semgrep.dev  🚀

🔒 Building an Application Security Program

June 20: Level 3
Register: ow.ly/puGP50RgpiC
Lars (@bob5ec) 's Twitter Profile Photo

I had a great time meeting the OWASP SAMM Community. Lots of like-minded people! TIL: OWASP SAMM is for people running an #AppSec program. Target groups are not Developers or Security Champions. Hence OWASP DSOMM and Security Belts need to be there to support these target groups.

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🦀 Eliminating Memory Safety Vulnerabilities at the Source Rust caused memory safety vulnerabilities % in Android to drop from 76% to 24% over 6 years. 💡Key insight: new code is disproportionately responsible for bugs By Jeff Vander Stoep, Alex Rebert security.googleblog.com/2024/09/elimin…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🛠️ Fuzzing confused dependencies with Depfuzzer New tool designed to automate the detection of dependency confusion vulnerabilities Repo: github.com/synacktiv/DepF… By Synacktiv synacktiv.com/en/publication…