Kiuwan logo

AppSec Blog

Keep up with the latest news on cybersecurity, technical trends, and programming best practices.

Recent Posts

Why Cybercriminals Love REST

Many applications provide a services layer (to other applications, to a presentation layer, etc.). Or, they consume services exposed by third-parties (not necessarily trusted). A REST model is a simple, widely-used way for designing such service layers. This ...
Bad guys love REST graphic

6 Current Cybersecurity Trends

As new technologies and big data deliver previously unimagined connections and conveniences, the shadow side of cyber threats is also growing. Cybercriminals can scale to unprecedented levels using artificial intelligence (AI) and launch sophisticated attacks...
cybersecurity graphic

Understanding CWE: Common Weakness Enumeration

Common Weakness Enumeration (CWE) is a software and hardware weaknesses classification system. It’s an extension of the Common Vulnerabilities and Exposures (CVE) list compiled by MITRE. This federally funded, non-profit organization manages research and deve...

How to Avoid SQL Injection Attacks

As the cybersecurity landscape becomes increasingly complex, it’s essential for organizations to stay informed about the tactics most likely to be used against them. In 2023, SQL injection attacks accounted for 23% of all critical web application vulner...
SQL injection blog graphic

5 Tips to Improve DevSecOps Practices

With data protection and consumer privacy regulations rapidly expanding, and AI regulations gathering on the horizon, taking a comprehensive and strict approach to cybersecurity is no longer optional. To comply, organizations are adopting a DevSecOps approach...
Improving DevSecOps graphic

Secure Your Code,
Protect Your Business

Detect vulnerabilities early and strengthen your security. Take control now to safeguard your app. See Kiuwan in action!
csharp2-1-300×300-1
© 2025 Kiuwan. All Rights Reserved.