Awesome. Security. Advice.
Home
Services
Kubernetes PTaaS
Product Security
Cloud Security
Consulting
Meta DPA
About Us
Pricing
Blog
Masterclass
Contact Us
Appsecco Blogs
Read our latest thoughts on all things
security, tech and life at Appsecco.
Cloud Security
Thunder CTF Walkthrough: Part 1
Saumya Kasthuri
6 mins
Getting Started with Google Cloud Platform
Finding Treasures in Github and Exploiting AWS for Fun and Profit — Part 1
Davos 2023: Experts call for a global response to the gathering 'cyber storm'
Security blog tips and tricks
Our recent news & insights
All
APPLICATION SECURITY
CLOUD SECURITY
CULTURE
DEVSECOPS
PENTESTING
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
APPLICATION SECURITY
6 mins
Exploiting weak configurations in Google Cloud Identity Platform
Pankaj Mouriya
CULTURE
5 min read
My Journey @Appsecco
Priyam Singh
APPLICATION SECURITY
7 mins read
Exploiting weak configurations in Amazon Cognito
Pankaj Mouriya
CULTURE
DEVSECOPS
3 min read
AllDayDevOps Virtual Viewing Party at Appsecco
Shruthi K
PENTESTING
4 min read
Zerologon (CVE-2020-1472) detection, patching and monitoring
Riyaz W
CULTURE
9 min read
My experience as an intern learning about DevSecOps
Ayush Priya
APPLICATION SECURITY
4 min read
Microservices Authorization using Open Policy Agent and Traefik (API Gateway)
Abhishek Datta
DEVSECOPS
6 min read
Finding SSRF via HTML Injection inside a PDF file on AWS EC2
Riyaz W
Previous
For more blogs, visit:
blog.appsecco.com