cybersecurity

5 Articles

Cyclomatic Complexity in Software Development and Its Impact on Cybersecurity

Cyclomatic complexity is a crucial metric for understanding code complexity and its impact on cybersecurity. This article explores cyclomatic complexity, its effects on code quality, and its connection to cybersecurity. It also provides examples of how cyclomatic complexity can impact software security and ways to mitigate its risks.

What Is Network Fuzzing?

In this post, we will talk about network fuzzing, a technique for automatically or semi-automatically detecting software errors.

FreeBSD Pot vs Docker A Technical Comparison

In this article, I will share my opinion on FreeBSD Pot vs. Docker based on my experience using both tools.

Understanding Lua Scripts in Redis The Ping Pong Example

Redis has de the feature of executing Lua scripts. This post explains how Redis handles potentially dangerous Lua scripts, using a "ping-pong" example. At the first glance, the Lua script seems to be an infinite loop. However, Redis has built-in protections that recognize the recursion pattern in the script. The secure Lua environment in Redis is designed to catch and prevent such infinite loops from running. This stops the script from consuming resources endlessly, ensuring the stability and security of the system. Redis enforces a read-only table restriction in this context, which prevents modifications that could lead to uncontrolled recursion.

DevSecOps series No. 1 — Breaking the CI/CD by using evil Git repositories

This is the first post of a serie about DevSecOps. We’ll discuss about (in)security in DevSecOps process. Today we’ll check security in building process when you need external GIT.