What web application vulnerabilites are most likey to be found in a source code review vs a grey box pentest?

What type of vulnerabilities would be found additional in a source code review vs a pentest?

If my organization performs regular grey box pentests, do we really require to perform source code reviews?

Continue reading What web application vulnerabilites are most likey to be found in a source code review vs a grey box pentest?

What web application vulnerabilites are most likey to be found in a source code review vs a grey box pentest?

What type of vulnerabilities would be found additional in a source code review vs a pentest?

If my organization performs regular grey box pentests, do we really require to perform source code reviews?

Continue reading What web application vulnerabilites are most likey to be found in a source code review vs a grey box pentest?

Custom code accounts for 93% of application vulnerabilities

Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, applications contain both custom code – the code developed by an organization – and third-party libraries. Contrast Labs analyzed 1,857 software applications, which included several thousand different open source libraries, frameworks, and modules, and found that custom code represents an average of 21 percent of an application’s code, and libraries occupy the remaining … More Continue reading Custom code accounts for 93% of application vulnerabilities

Organizations are not effectively dealing with open source security threats

Black Duck conducts hundreds of open source code audits annually, primarily related to Merger & Acquisition transactions. Its Center for Open Source Research & Innovation (COSRI) analyzed 1,071 applications audited during 2016 and found both high levels of open source usage – 96% of the apps contained open source – and significant risk to open source security vulnerabilities – more than 60% of the apps contained open source security vulnerabilities. Notably, audit results of applications … More Continue reading Organizations are not effectively dealing with open source security threats