Aikido Security
Aikido Security
  • Видео 16
  • Просмотров 9 469
Aikido Security - no-nonsense security platform for developers
Aikido security is your no-nonsense security platform. One central system that shows you what matters and how to fix it- from code to CI to cloud. Combine the power of 9 different scanners like SCA, SAST, DAST, Secrets Detection and more into one smart security feed.
Try Aikido today - aikido.dev
Просмотров: 14

Видео

Using AI to discover undisclosed vulnerabilities in open-source - Aikido Intel
Просмотров 33214 часов назад
We conducted a research project to use AI LLMs to discover how many vulnerabilities in open-source projects are patched, but never disclosed. To do this we trained LLMs to read changelogs in projects and discover when security fixes were applied but no CVE was created yet. We discovered the 67% of all projects never were publically disclosed including some pretty scary examples. Checkout Aikido...
SQL injection in 2024, the vulnerability that won't go away
Просмотров 96121 день назад
SQL injection (SQLi) is a vulnerability as old as the internet itself, yet it remains one of the most exploited security flaws today. Despite decades of breaches, best practices, and tools, organizations still struggle to prevent SQLi attacks. In this video, we explore why SQL injection is still a critical issue in 2024, dive into the latest statistics on SQLi vulnerabilities in open-source and...
Insecure Design Explained: Business Logic Flaws, STRIDE Threat Modeling & more - OWASP top 10
Просмотров 310Месяц назад
In this video, we break down Insecure Design, a critical issue from the OWASP Top 10, that leads to serious vulnerabilities in applications. Dive into real-world examples of insecure design flaws, such as business logic vulnerabilities, revealing sensitive data in error messages, and failure to log critical actions. We also cover essential prevention strategies using frameworks like STRIDE for ...
Injection Attacks 101: SQL Injection, Code Injection, and XSS
Просмотров 9542 месяца назад
This video dives into the world of injection attacks, including SQL injection, code injection, and cross-site scripting (XSS). It explains how these vulnerabilities work, demonstrates practical examples of exploiting them, and discusses the impact of real-world breaches. The video also covers essential prevention techniques, such as input validation and the use of security tools, to protect web...
Understanding OWASPs Cryptographic Failures, Lessons from breaches and prevention methods
Просмотров 2092 месяца назад
In this video, we dive deep into cryptographic failures, the second most critical vulnerability in the OWASP Top 10. Cryptographic vulnerabilities can expose sensitive data, lead to breaches, and compromise entire systems. We explore what cryptographic failures are, the common causes behind them, and how to avoid them. Using the Freecycle breach as a real-world case study, we examine the devast...
Disney's drops Slack after Hack..... What we can learn from it
Просмотров 1213 месяца назад
Disney announced it will be leaving Slack as an internal messaging system after suffering a breach where sensitive information was leaked. In this video we look at what exactly happened, what it means for the security of Slack and if this is the end of Disneys security troubles (for now).
Broken Access Control Explained: The #1 OWASP Vulnerability You Need to Fix
Просмотров 5683 месяца назад
Broken Access Control Explained: The #1 OWASP Vulnerability You Need to Fix