YevhSec1Why Storing Plaintext Passwords in a Private S3 Bucket it’s bad idea?Let’s imagine that you store usernames and passwords in cleartext in the S3 bucket. Let’s assume that access to the entire bucket is…1 min read·Sep 25, 2023----
YevhSec1AWS Account Hijacking via CI/CDIn the evolving landscape of cloud computing, AWS (Amazon Web Services) stands out as a leading service provider. However, as with any…2 min read·Jul 27, 2023----
YevhSec1GPT-4 Technical Report analysisLink: https://cdn.openai.com/papers/gpt-4.pdf6 min read·Mar 17, 2023----
YevhSec1DevSecOps — integrating SAST, SCA, Secrets detection, Container security and IaC scanning with JIT.iDo you still remember when it took a long time to implement Security controls into your workflow? Let’s do it in a few minutes with JIT.io…3 min read·Sep 21, 2022--3--3
YevhSec1Could GitHub Copilot produce a vulnerable code?GitHub Copilot is an interesting solution that promises to simplify the developer’s day-to-day tasks. This short article aims to answer the…7 min read·Aug 24, 2022----
YevhSec1Google Indexing — how to fixSearch engines doing really great job in indexing content. Of course everyone wants to be at the top of the search results. But sometimes…2 min read·Jul 23, 2022----
YevhSec1iOS Apps Security scanners practical comparisonIn this article, I tried to overview: What iOS Apps Security Scanners exist on the market, What capabilities they provide, and what…5 min read·Feb 20, 2022----
YevhSec1DevSecOps — What Security Controls exist and when to implement them?In this short article, I tried to overview what Security Controls exists, what stage it can be added to the CI/CD process, and what…4 min read·Jan 15, 2022----
YevhSec1Implementing Application Security on your projectThe main purpose: CyberSecurity should help businesses succeed.6 min read·Dec 22, 2021----