For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
Malicious NPM Package Hides Pulsar .NET Malware Inside PNG Images
(
veracode.com
)
2 points
by
SamHoustonCM
47 days ago
|
past
|
1 comment
We Asked 100 AI Models to Write Code
(
veracode.com
)
3 points
by
ygritte
8 months ago
|
past
|
1 comment
GenAI Code Security Report [pdf]
(
veracode.com
)
3 points
by
_tk_
8 months ago
|
past
Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2
(
veracode.com
)
3 points
by
gnabgib
10 months ago
|
past
Exploiting JNDI Injections in Java (2019)
(
veracode.com
)
2 points
by
crummy
on Dec 17, 2021
|
past
State of Software Security: open-source Edition
(
veracode.com
)
26 points
by
giuliomagnifico
on June 27, 2021
|
past
|
5 comments
How to Set Up Veracode in a Large Azure Project
(
veracode.com
)
1 point
by
bramkrom
on April 23, 2021
|
past
Top Security Anti-Patterns in Asp.net Core Applications
(
veracode.com
)
2 points
by
relaxnow
on March 2, 2021
|
past
Secure Coding Challenge at Veracode
(
veracode.com
)
5 points
by
jalane81
on Jan 11, 2021
|
past
State of Software Security Flaw Frequency by Language [pdf]
(
veracode.com
)
8 points
by
adityatelange
on Dec 25, 2020
|
past
|
1 comment
State of Software Security for 2020
(
veracode.com
)
1 point
by
pjmlp
on Dec 22, 2020
|
past
Write code that protects sensitive user data
(
veracode.com
)
1 point
by
jalane81
on Sept 17, 2020
|
past
Veracode Launches Free Community Edition of Security Labs for Developers
(
veracode.com
)
2 points
by
jalane81
on Aug 4, 2020
|
past
State of Software Security: open-source Edition
(
veracode.com
)
1 point
by
based2
on May 21, 2020
|
past
|
1 comment
ISO: Principal Java Developer for New Product
(
veracode.com
)
2 points
by
lgagnon
on Feb 4, 2019
|
past
Exploiting JNDI Injections in Java
(
veracode.com
)
1 point
by
based2
on Jan 3, 2019
|
past
SourceClear acquired by Veracode
(
veracode.com
)
1 point
by
tensor
on June 13, 2018
|
past
How a Single Phone Call Can Compromise Your Company
(
veracode.com
)
3 points
by
Neostrategos
on Sept 13, 2017
|
past
Anatomy of a Cross-Site Scripting Flaw in the Telerik Reporting Module
(
veracode.com
)
1 point
by
relaxnow
on June 6, 2017
|
past
Encryption and Decryption in Java Cryptography
(
veracode.com
)
1 point
by
Neostrategos
on April 19, 2017
|
past
Cryptographically Secure Pseudo-Random Number Generator (CSPRNG)
(
veracode.com
)
3 points
by
Neostrategos
on March 29, 2017
|
past
Supporting software that spans over 50 years of history
(
veracode.com
)
2 points
by
Neostrategos
on Oct 5, 2016
|
past
Why DevOps Is Not DevSecOps
(
veracode.com
)
1 point
by
DrinkWater
on Sept 1, 2016
|
past
A developer’s perspective on last minute security requirements
(
veracode.com
)
1 point
by
Neostrategos
on Feb 3, 2016
|
past
3 Easy Steps to Making Perfect Security Possible
(
veracode.com
)
1 point
by
Neostrategos
on Oct 27, 2015
|
past
AngularJS Expression Security Internals
(
veracode.com
)
3 points
by
sprkyco
on June 25, 2015
|
past
Popular Third-Party Applications Can Have Vulnerabilities Too
(
veracode.com
)
2 points
by
anand-s
on June 25, 2015
|
past
What Is the State of Software Security in 2015?
(
veracode.com
)
1 point
by
anand-s
on June 24, 2015
|
past
Golang's Context Aware HTML Templates (2013)
(
veracode.com
)
4 points
by
StandardFuture
on Nov 10, 2014
|
past
Misfeatures Strike Again
(
veracode.com
)
1 point
by
luu
on Sept 26, 2014
|
past
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.