Blog
OWASP #5 Broken Access Control
2021-10-19 | By Jason Lu
In the OWASP Top Ten list, the number 5 vulnerability is Broken Access Control. This is concerned with how web applications grant systems access to...
read the storyThe Customer First Philosophy!
2021-09-14 | By Yanwen Lu
Our Product Manager, Yanwen, shares her insights on how to prioritize customer satisfaction by actively maintaining communication with customers, and deliver static code analysis tools...
read the storyWhat is the Connection Between CERT & CWE?
2021-08-26 | By Tan Rahman
Up to 90% of software security problems are caused by defects in source code. Coding standards are critical to eliminate vulnerabilities. Our latest blog post...
read the storyOWASP #4 XML EXTERNAL ENTITIES (XXE)
2021-08-09 | By Jason Lu
The safest way to prevent XXE is to always disable External Entities completely. Disabling these also makes the parser secure against denial of services (DOS...
read the storyIntroduction to Compiler Technology
2021-07-16 | By Jianxin Lai
Most technologists agree that Moore’s Law, the two-fold increase of the number of transistors placed upon a chip each year, has come to...
read the storyOWASP #3 Sensitive Data Exposure
2021-06-09 | By Jane Yang
The next blog article in our OWASP Top Ten series is number 3, Sensitive Data. When your data is at rest, in transit or in...
read the storyEmbedded Programming and IoT – Memory Management Criticality!
2021-05-18 | By Tan Rahman & Jane Yang
In this blog article, we explore some of the pitfalls faced by developers when using lower-level compiled languages with the Internet of Things...
read the storyOWASP #2 – Broken Authentication
2021-05-06 | By Jason Lu
Broken Authentication ranks No. 2 in the OWASP top ten list and despite being easily countered, is an all too often-seen problem in software...
read the storyOWASP #1 Injection
2021-04-02 | By Jason Lu
The first article of our OWASP Top Ten series, injection...
read the storyVerifying Business Logic in One Step, Saving a Hundred Steps Fixing Defects
2021-03-04 | By Dr. Long Li
In this article, Xcalibyte’s Chief Scientist, Long Li, looks at how Xcalibyte uses mathematical computational models to uncover defects and vulnerabilities in source code...
read the story