PinnedKrzysztof PranczkinITNEXTWeb API Security Champion: Broken Object Level Authorization (OWASP TOP 10)Explaining one of the most common web API vulnerability classes — Broken Object Level Authorization in a practical manner. Providing a…Apr 22Apr 22
PinnedKrzysztof PranczkinITNEXTSecurity Code Challenge for Developers & Ethical Hackers — The Damn Vulnerable RESTaurantIntroduction to a security code challenge dedicated to developers and ethical hackers. It focuses on security vulnerabilities in Web API.Apr 3Apr 3
PinnedKrzysztof PranczkinITNEXTPython for DevSecOps and Any Security EngineerDoes DevSecOps Engineer need programming skills? What is the value of utilising Python for security purposes? What you need to learn to…Oct 11, 20235Oct 11, 20235
PinnedKrzysztof PranczkA Practical Approach to SBOM in CI/CDThe article covers the concept of SBOM, its advantages, popular formats and practical implementations for both Java and Python projects.Sep 17, 20233Sep 17, 20233
Krzysztof PranczkinITNEXTDetecting Banker Malware Installed on Android DevicesThis article presents mechanisms and ideas for detecting malicious applications installed on Android devices that abuse the…Mar 202Mar 202
Krzysztof PranczkinITNEXTIntroduction to Security in SDLC with SAST for Developers and Security EngineersIn today’s landscape, automation plays a crucial role in various development activities, ranging from ensuring code quality and performing…Feb 23Feb 23
Krzysztof PranczkinITNEXTExploring secureCodeBox — An Open-Source Continuous Security Testing Solution for DevSecOpsA Comprehensive Review of secureCodeBox — an Open-Source Platform for Continuous Security Utilizing Popular Testing Tools. Presenting…Jan 292Jan 292
Krzysztof PranczkinITNEXTA Programmer’s Journey: Crafting a Python API Client for the On-line Game Using ChatGPTSharing my experience with ChatGPT as an LLM sceptical person. The article presents development of a basic Python API client for Age of…Jan 15Jan 15
Krzysztof PranczkinITNEXTComparing DefectDojo Pro and OWASP Edition for DevSecOpsA review of DefectDojo Pro — a paid version of a well-known vulnerability management solution: Does DefectDojo Pro address all the pain…Jan 91Jan 91
Krzysztof PranczkinITNEXTIntroduction to Kubernetes Security for Security ProfessionalsPresenting the architecture of Kubernetes and its associated security threats, for security professionals, including penetration testers…Dec 27, 2023Dec 27, 2023