SemmleOvjeren akaunt

@Semmle

A code analysis platform for finding zero-days and automating variant analysis | Creators of QL and

SF | NYC | Seattle | Oxford | Copenhagen | Valencia
Vrijeme pridruživanja: veljača 2016.

Tweetovi

Blokirali ste korisnika/cu @Semmle

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Semmle

  1. Prikvačeni tweet
    18. ruj 2019.

    Big news! Semmle is joining the team to bring community-powered security analysis to millions of developers. Learn more from Semmle CEO here:

    Poništi
  2. proslijedio/la je Tweet
    2. pro 2019.

    ICYMI: We're running a CTF until December 31st. Write a CodeQL query to find a specific class of DOM-based XSS vulns. The 2 best submissions will win Nintendo Switches, and 10 additional entries will receive coupons that can be used for GitHub Swag.

    Poništi
  3. proslijedio/la je Tweet

    We've just launched a new slack workspace for anyone interested in being part of the mission to secure the open source software we all depend on. If you'd like to receive an invitation to join the workspace, send us a DM with your email address.

    Poništi
  4. proslijedio/la je Tweet

    Yesterday we had our first GitHub Security Meetup, with ligthning talks by and Abishek Arya (Google). But also with exciting discussions with security folks. Thanks to all attendees and others: stay tuned for the next one in January.

    Poništi
  5. proslijedio/la je Tweet

    Learn how our security researcher found wireless vulnerabilities in the Linux Kernel, and variants, thanks to CodeQL:

    Poništi
  6. proslijedio/la je Tweet

    Want to challenge your vulnerability hunting skills? Try our latest Capture The Flag and discover XSS-unsafe jQuery plugins:

    Poništi
  7. proslijedio/la je Tweet

    Check out the GitHub Security Lab bounty program! . Write a query, find bugs, get rewarded.

    Poništi
  8. 14. stu 2019.

    Welcome to the GitHub Security Lab ! Join us and contribute to secure the world's code! Visit

    Poništi
  9. 21. lis 2019.

    Want to learn more about QL and how you can use it to find variants of vulnerabilities in your code? Join us for our Semmle User Group this Wednesday night at Mozilla. See the event details for more information.

    Poništi
  10. 16. lis 2019.

    Semmle security researcher discloses another integer overflow vulnerability in libssh2, which could potentially lead to information disclosure

    Poništi
  11. 4. lis 2019.

    Wondering how found 13 CVEs in U-boot? Watch his presentation "Using One Exploitable Zero-Day to Eradicate an Entire Class of Vulnerabilities" on-demand:

    Poništi
  12. 3. lis 2019.

    Is your code VUCA (Volatile, Uncertain, Complex, Ambiguous)? Let's see how the OODA Loops theory inspires our code review practices.

    Poništi
  13. proslijedio/la je Tweet
    3. lis 2019.

    Join us today for some fun and examples of finding vulnerabilities! Let's democratize security

    Poništi
  14. 2. lis 2019.

    In this video, discusses the libssh2 integer overflows and out-of-bounds read he recently discovered. See how it can be triggered by connecting to a malicious ssh server

    Poništi
  15. 2. lis 2019.

    Imagine if your dev team could have automated code review powered by security expertise? Tomorrow, join and to see how community-powered security can become a part of the developer’s workflow.

    Poništi
  16. proslijedio/la je Tweet
    30. ruj 2019.

    Thanks for everyone that attend my QL workshop at ! Here is some of the material covered during the workshop:

    Poništi
  17. 1. lis 2019.

    Are unit tests really effective in preventing bugs? We analyzed over 50k LGTM projects in Java, Python, and Javascript to find out.

    Poništi
  18. proslijedio/la je Tweet
    1. lis 2019.

    Now in beta! LGTM is supporting Golang and we have some projects that you can explore. Check them out and suggest others you'd like us to analyze.

    Poništi
  19. proslijedio/la je Tweet

    Awesome meeting and hanging out with our CTF winner at

    Poništi
  20. 30. ruj 2019.

    . takes a deep dive into past Android vulnerabilities that exploited C++ pointers wrapped inside Java objects.

    Poništi
  21. proslijedio/la je Tweet

    Was super fun speaking at Amsterdam! Thanks to everyone who attended!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·