Given this secure setup, what are some effective attacks that still are possible?

My company is developing an open-source platform that would be hosted on may different servers, deployed in the cloud by many people, that run the "LAMP" stack or something similar. My goal is to ensure that in 99.9% of cases, th… Continue reading Given this secure setup, what are some effective attacks that still are possible?

Given this secure setup, what are some effective attacks that still are possible?

My company is developing an open-source platform that would be hosted on may different servers, deployed in the cloud by many people, that run the "LAMP" stack or something similar. My goal is to ensure that in 99.9% of cases, th… Continue reading Given this secure setup, what are some effective attacks that still are possible?

How much should we generally trust security-only support of a legacy version of a software and what should we look out for? [closed]

Many software vendors maintain old versions by providing security-only fixes. Some examples include:

Android on Google Pixel Phones.
Python.
Firefox ESR.

My understanding is that people are most actively working on the latest version of … Continue reading How much should we generally trust security-only support of a legacy version of a software and what should we look out for? [closed]

How to manage a lot of vulnerability scanners from CICD Pipelines?

My company has a lot of projects and uses various vulnerability scanners (e.g. Trivy, npm audit, SAST,…) in different stages in each of them.
The Problem is now that although they run well, it’s not easy to keep the overview over each of… Continue reading How to manage a lot of vulnerability scanners from CICD Pipelines?