<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Guia de AppSec :: Blog]]></title><description><![CDATA[Tornando a vida do security champion um pouco mais fácil a cada dia =)]]></description><link>https://blog.guiadeappsec.com.br</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1665792359179/vCROD7kC3.png</url><title>Guia de AppSec :: Blog</title><link>https://blog.guiadeappsec.com.br</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 19 Apr 2026 20:08:23 GMT</lastBuildDate><atom:link href="https://blog.guiadeappsec.com.br/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[AppSec Newsletter 0044]]></title><description><![CDATA[Olá champs! Chegamos a mais uma edição da nossa newsletter!
Vídeo novo no canal
Você deve ter visto que as últimas semanas foram movimentadas com tantos pacotes NPM sendo comprometidos. No vídeo de hoje vamos falar sobre a estratégia de AppSec para m...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0044</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0044</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[Security]]></category><category><![CDATA[Artificial Intelligence]]></category><category><![CDATA[mcp]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Mon, 29 Sep 2025 13:36:16 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1759152896304/e763b7ae-8480-4cb6-ad80-bcdb66e1dea4.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Olá champs! Chegamos a mais uma edição da nossa newsletter!</p>
<h2 id="heading-video-novo-no-canal">Vídeo novo no canal</h2>
<p>Você deve ter visto que as últimas semanas foram movimentadas com tantos pacotes NPM sendo comprometidos. No vídeo de hoje vamos falar sobre a estratégia de AppSec para mitigarmos este tipo de risco.</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=kfc3pA2V_ZM">https://www.youtube.com/watch?v=kfc3pA2V_ZM</a></div>
<p> </p>
<h2 id="heading-devseccon">DevSecCon</h2>
<p>Dia 22 de outubro vamos ter a DevSecCon! Online e gratuito!</p>
<p><a target="_blank" href="https://snyk.co/ujarR">Faça seu cadastro aqui!</a></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1759152050929/1514dea5-9e64-4224-a4d7-2f949c5c2212.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-links">Links</h2>
<ul>
<li><p>Snyk publicou um artigo sobre detectar Tool Poisoning em MCPs: <a target="_blank" href="https://labs.snyk.io/resources/detect-tool-poisoning-mcp-server-security/">https://labs.snyk.io/resources/detect-tool-poisoning-mcp-server-security/</a></p>
</li>
<li><p>Caido lançou um lab gratuito para entender e praticar webhacking: <a target="_blank" href="https://labs.cai.do/">https://labs.cai.do/</a></p>
</li>
<li><p>Lakera publicou um artigo sobre um Zero Click RCE em MCP: <a target="_blank" href="https://www.lakera.ai/blog/zero-click-remote-code-execution-exploiting-mcp-agentic-ides">https://www.lakera.ai/blog/zero-click-remote-code-execution-exploiting-mcp-agentic-ides</a></p>
</li>
<li><p>Amazon publicou um artigo sobre acelerar Threat Modeling com IA Generativa: <a target="_blank" href="https://aws.amazon.com/pt/blogs/machine-learning/accelerate-threat-modeling-with-generative-ai/?utm_source=chatgpt.com">https://aws.amazon.com/pt/blogs/machine-learning/accelerate-threat-modeling-with-generative-ai/?utm_source=chatgpt.com</a></p>
</li>
<li><p>Um site foi criado especificamente para segurança de MCP: <a target="_blank" href="https://modelcontextprotocol-security.io/">https://modelcontextprotocol-security.io/</a></p>
</li>
<li><p>Snyk publicou um artigo sobre uso de IA por bibliotecas maliciosas para otimizar o exploit: <a target="_blank" href="https://snyk.io/pt-BR/blog/weaponizing-ai-coding-agents-for-malware-in-the-nx-malicious-package/">https://snyk.io/pt-BR/blog/weaponizing-ai-coding-agents-for-malware-in-the-nx-malicious-package/</a></p>
</li>
<li><p>Paper sobre MCP landscape, security threats e pesquisas futuras: <a target="_blank" href="https://arxiv.org/pdf/2503.23278">https://arxiv.org/pdf/2503.23278</a></p>
</li>
<li><p>A Michelle publicou um artigo sobre arquitetura + STRIDE com MCP no Cursor: <a target="_blank" href="https://michelleamesquita.medium.com/automatizando-arquitetura-stride-com-mcp-no-cursor-c778de635110">https://michelleamesquita.medium.com/automatizando-arquitetura-stride-com-mcp-no-cursor-c778de635110</a></p>
</li>
</ul>
<h2 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h2>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
<p><a target="_blank" href="https://snyk.io/pt-BR/schedule-a-demo/"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751231873336/fdd89d2f-2efd-4003-b92d-be8dc4ba6dad.jpeg?auto=compress,format&amp;format=webp" alt class="image--center mx-auto" /></a></p>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0043]]></title><description><![CDATA[Novo vídeo no canal!
Se você desenvolve aplicações que recebem um input do usuário e envia ele para uma LLM processar, seja local ou remoto, é importantíssimo que você entenda os riscos que corre nesta integração.
https://www.youtube.com/watch?v=O0ZG...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0043</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0043</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[SAST]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 29 Jun 2025 21:19:41 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1751231399546/ccb908db-0af9-4d05-95fa-9f12492ca92b.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-novo-video-no-canal">Novo vídeo no canal!</h2>
<p>Se você desenvolve aplicações que recebem um input do usuário e envia ele para uma LLM processar, seja local ou remoto, é importantíssimo que você entenda os riscos que corre nesta integração.</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=O0ZGHde0jPw">https://www.youtube.com/watch?v=O0ZGHde0jPw</a></div>
<p> </p>
<h2 id="heading-links">Links</h2>
<ul>
<li><p><a target="_blank" href="https://github.com/precize/Agentic-AI-Top10-Vulnerability">Top 10 threats and mitigation for AI Agents | OWASP</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/slowmist/MCP-Security-Checklist">MCP Security Checklist: A Security Guide for the AI Tool Ecosystem | Slow Mist</a></p>
</li>
<li><p><a target="_blank" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218A.pdf">Secure Software Development Practices for Generative AI and Dual-Use Foundation Models | Nist</a></p>
</li>
<li><p><a target="_blank" href="https://blog.virustotal.com/2025/06/what-17845-github-repos-taught-us-about.html?m=1">What 17,845 GitHub Repos Taught Us About Malicious MCP Servers | VirusTotal Blog</a></p>
</li>
<li><p><a target="_blank" href="https://www.philvenables.com/post/starting-a-security-program-from-scratch-or-re-starting">Starting a Security Program from Scratch (or re-starting) | Phil Venables</a></p>
</li>
<li><p><a target="_blank" href="https://www.paloaltonetworks.com/blog/cloud-security/kubernetes-attack-detection-response/">Anatomy of a Kubernetes Attack: How Cortex Cloud Provides End-to-End Protection | Palo Alto</a></p>
</li>
<li><p><a target="_blank" href="https://link.springer.com/article/10.1007/s11416-025-00556-2">Defeating FIDO2/CTAP2/WebAuthn using browser in the middle and reflected cross site scripting | Springer</a></p>
</li>
</ul>
<h2 id="heading-snyk">Snyk</h2>
<ul>
<li><p><a target="_blank" href="https://snyk.io/pt-BR/news/snyk-announces-first-ai-trust-platform-to-revolutionize-secure-software-for-the-ai-era/">Snyk anuncia a primeira plataforma AI Trust para revolucionar o desenvolvimento de software seguro na Era da IA</a></p>
</li>
<li><p><a target="_blank" href="https://snyk.io/pt-BR/news/snyk-acquires-invariant-labs-to-accelerate-agentic-ai-security-innovation/">Snyk Acquires Invariant Labs to Accelerate Agentic AI Security Innovation</a></p>
</li>
</ul>
<p><a target="_blank" href="https://snyk.io/pt-BR/schedule-a-demo/"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1751231873336/fdd89d2f-2efd-4003-b92d-be8dc4ba6dad.jpeg" alt class="image--center mx-auto" /></a></p>
<h2 id="heading-siga-o-guia-de-appsec-nas-redes">Siga o Guia de AppSec nas redes!</h2>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0042]]></title><description><![CDATA[Novo video no canal!
A essa altura do campeonato você já deve ter ouvido sobre MCP. Bem, vamos entender um pouco mais do que é o protocolo e criar o nosso primeiro:
https://www.youtube.com/watch?v=hT72pLOLRaQ
 
Links

🏆 Lakera Gandalf - Prompt Injec...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0042</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0042</guid><category><![CDATA[appsec]]></category><category><![CDATA[AI]]></category><category><![CDATA[mcp]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 04 May 2025 15:30:48 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1746372594986/0d2496eb-1e5a-4f15-99e7-0d5bcea29855.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-novo-video-no-canal">Novo video no canal!</h3>
<p>A essa altura do campeonato você já deve ter ouvido sobre MCP. Bem, vamos entender um pouco mais do que é o protocolo e criar o nosso primeiro:</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=hT72pLOLRaQ">https://www.youtube.com/watch?v=hT72pLOLRaQ</a></div>
<p> </p>
<h3 id="heading-links">Links</h3>
<ul>
<li><p><a target="_blank" href="https://gandalf.lakera.ai/baseline">🏆 Lakera Gandalf - Prompt Injection Online CTF | lakera.ai</a></p>
</li>
<li><p><a target="_blank" href="https://hakluke.com/remote-code-execution-vs-remote-command-execution-vs-code-injection-vs-command-injection-vs-rce">Remote Code Execution vs. Remote Command Execution vs. Code Injection vs. Command Injection vs. RCE | hakluke.com</a></p>
</li>
<li><p><a target="_blank" href="https://blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp/?utm_content=331479208&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-912286">Deceiving users with ANSI terminal codes in MCP | trailofbits.com</a></p>
</li>
<li><p><a target="_blank" href="https://blog.trailofbits.com/2025/04/23/how-mcp-servers-can-steal-your-conversation-history/?utm_content=331126531&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-912286">How MCP servers can steal your conversation history | trailofbits.com</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/Puliczek/awesome-mcp-security?tab=readme-ov-file">Awesome MCP Security | puliczek</a></p>
</li>
<li><p><a target="_blank" href="https://blog.christianposta.com/the-updated-mcp-oauth-spec-is-a-mess/">The MCP Authorization Spec Is... a Mess for Enterprise | christianposta.com</a></p>
</li>
<li><p><a target="_blank" href="https://socket.dev/blog/slopsquatting-how-ai-hallucinations-are-fueling-a-new-class-of-supply-chain-attacks">The Rise of Slopsquatting: How AI Hallucinations Are Fueling a New Class of Supply Chain Attacks | socket.dev</a></p>
</li>
<li><p><a target="_blank" href="https://block.github.io/goose/blog/2025/03/31/securing-mcp/">Securing the Model Context Protocol | block.github.io</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0041]]></title><description><![CDATA[Links

CVE-2025-29927: Next.js Middleware Authorization Bypass - Technical Analysis | Project Discovery

GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident: Threat Assessment...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0041</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0041</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[DevSecOps]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Mon, 24 Mar 2025 13:24:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1742822635125/911f399f-baea-47cc-a192-2f3cc830deff.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p><a target="_blank" href="https://projectdiscovery.io/blog/nextjs-middleware-authorization-bypass">CVE-2025-29927: Next.js Middleware Authorization Bypass - Technical Analysis | Project Discovery</a></p>
</li>
<li><p><a target="_blank" href="https://unit42.paloaltonetworks.com/github-actions-supply-chain-attack/">GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident: Threat Assessment (Updated 3/21) | PaloAlto</a></p>
</li>
<li><p><a target="_blank" href="https://boostsecurity-io.cdn.ampproject.org/c/s/boostsecurity.io/blog/pandoras-box-to-nuclear-fishing-escalating-threats-in-build-pipeline-security?hs_amp=true">From Pandora's Box to Nuclear Fishing: Escalating Threats in Build Pipelines Security | BoostSecurity</a></p>
</li>
<li><p><a target="_blank" href="https://www.tmbench.com/">TM-Bench - A Benchmark for LLM-Based Threat Modeling</a></p>
</li>
<li><p><a target="_blank" href="https://www.resilientcyber.io/p/vulnerability-exploitation-in-the">Vulnerability Exploitation in the Wild - A look at the inaugural study of EPSS Data and Performance | Resilient Cyber</a></p>
</li>
<li><p><a target="_blank" href="https://softwareanalyst.substack.com/p/securing-aillms-in-2025-a-practical">Securing AI/LLMs in 2025: A Practical Guide To Securing &amp; Deploying AI</a></p>
</li>
<li><p><a target="_blank" href="https://wellarchitected.github.com/">Github Well Architected - Best Practices for Designing, Implementing, and Optimizing Your GitHub Environment</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0040]]></title><description><![CDATA[Links

🎖️ Michelle Mesquita| DevSecOps com GitHub Actions

Github | Secret scanning expands default pattern support

MITRE | QUANTUM COMPUTING: QUANTIFYING THE CURRENT STATE OF THE ART TO ASSESS CYBERSECURITY THREATS

CyberSecTools | The Largest Hub...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0040</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0040</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[DevSecOps]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 09 Feb 2025 15:37:29 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1739115413064/6305a518-a936-42b0-a97a-635cdf63f9a7.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-links">Links</h2>
<ul>
<li><p>🎖️ <a target="_blank" href="https://www.udemy.com/course/devsecops-com-github-actions/?couponCode=KEEPLEARNINGBR">Michelle Mesquita| DevSecOps com GitHub Actions</a></p>
</li>
<li><p><a target="_blank" href="https://github.blog/changelog/2025-01-09-secret-scanning-expands-default-pattern-support/">Github | Secret scanning expands default pattern support</a></p>
</li>
<li><p><a target="_blank" href="https://www.mitre.org/sites/default/files/2025-01/PR-24-3812-Quantum-Computing-Quantifying-Current-State-Assess-Cybersecurity-Threats.pdf">MITRE | QUANTUM COMPUTING: QUANTIFYING THE CURRENT STATE OF THE ART TO ASSESS CYBERSECURITY THREATS</a></p>
</li>
<li><p><a target="_blank" href="https://cybersectools.com/">CyberSecTools | The Largest Hub of Cybersecurity Tools</a></p>
</li>
<li><p><a target="_blank" href="https://www.crowdstrike.com/en-us/blog/istio-configuration-finding-improve-kubernetes-security/">CrowdStrike | Improving Kubernetes Security: Lessons from an Istio Configuration Finding</a></p>
</li>
<li><p><a target="_blank" href="https://xvnpw.github.io/posts/forget-threats-mitigations-are-all-you-really-need/">xvnpw | Forget Threats, Mitigations are All You REALLY Need</a></p>
</li>
<li><p><a target="_blank" href="https://owasp.org/www-project-smart-contract-top-10/#">OWASP Smart Contract Top 10</a></p>
</li>
<li><p><a target="_blank" href="https://blog.palantir.com/how-palantir-secures-source-control-105c49079eae">How Palantir Secures Source Control (Software Supply Chain Security Series, #3)</a></p>
</li>
<li><p><a target="_blank" href="https://socket.dev/blog/malicious-package-exploits-go-module-proxy-caching-for-persistence">Socket | Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching for Persistence</a></p>
</li>
<li><p><a target="_blank" href="https://bughunters.google.com/blog/6644316274294784/secure-by-design-google-s-blueprint-for-a-high-assurance-web-framework">Google | Secure by Design: Google's Blueprint for a High-Assurance Web Framewor</a>k</p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0039]]></title><description><![CDATA[Café Seguro - Typo Squatting e C2 via Blockchain
https://www.youtube.com/watch?v=JLyIaAnoo4U
 
Links

https://github.com/ossf/package-analysis: The Package Analysis project analyses the capabilities of packages available on open source repositories.
...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0039</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0039</guid><category><![CDATA[appsec]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 26 Jan 2025 14:52:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1737903122826/f144d52e-8cdf-480d-8763-ac8560655250.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-cafe-seguro-typo-squatting-e-c2-via-blockchain">Café Seguro - Typo Squatting e C2 via Blockchain</h3>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=JLyIaAnoo4U">https://www.youtube.com/watch?v=JLyIaAnoo4U</a></div>
<p> </p>
<h3 id="heading-links">Links</h3>
<ul>
<li><p><a target="_blank" href="https://github.com/ossf/package-analysis">https://github.com/ossf/package-analysis</a>: The Package Analysis project analyses the capabilities of packages available on open source repositories.</p>
</li>
<li><p><a target="_blank" href="https://s1r1us.ninja/">s1r1us blog</a>: a nice security blog =)</p>
</li>
<li><p><a target="_blank" href="https://www.youtube.com/watch?v=R3SE4VKj678">Hacking Discord for $5000 Bounty</a>: A video of Mrgavyadha explaing a bug report in Discord BBP.</p>
</li>
<li><p><a target="_blank" href="https://www.chainguard.dev/chainguard-images">Chainguard Images</a>: Build secure applications on a foundation of minimal, hardened container images to protect against vulnerabilities and attacks.</p>
</li>
<li><p><a target="_blank" href="https://medium.com/@cnetsec/a-vulnerability-cve-2024-39025-has-been-identified-in-lettaai-memgpt-v0-3-17-146cb38bb6db">CVE-2024-39025 by cnetsec</a>: Vulnerability in LettaAI</p>
</li>
<li><p><a target="_blank" href="https://billatnapier.medium.com/shock-news-sha-256-ecdsa-and-rsa-not-approved-in-australia-by-2030-3d1c286cad58">Shock News: SHA-256, ECDH, ECDSA and RSA Not Approved by ASD in Australia for 2030 by Prof Bill Buchanan</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/owaspsamm/core/releases/tag/v2.1.0">OWASP SAMM v2.1.0 Core</a>: New version of SAMM</p>
</li>
<li><p><a target="_blank" href="https://thehackernews.com/2024/11/xmlrpc-npm-library-turns-malicious.html">XML-RPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner</a></p>
</li>
<li><p><a target="_blank" href="https://www.csoonline.com/article/567759/3-devsecops-success-stories.html/amp/">3 DevSecOps success stories by Michael Nadeau and Dan Swinhoe</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0038]]></title><description><![CDATA[Links

🎖️ Monitoramento Regular de Repositórios Git para Identificação de Dados PII com AWS Macie | Gustavo Rorato

eBPF Foundation Releases Security Threat Model and Audit Reports | TheNewStack

Supply Chain Attacks Targeting LLM Application Develo...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0038</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0038</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[DevSecOps]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 29 Nov 2024 23:57:57 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1732924634059/cd754420-81e1-4709-80bf-ccabb7cf5112.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>🎖️ <a target="_blank" href="https://medium.com/@gustavororato/monitoramento-regular-de-reposit%C3%B3rios-git-para-identifica%C3%A7%C3%A3o-de-dados-pii-com-aws-macie-ca3e920a19c1">Monitoramento Regular de Repositórios Git para Identificação de Dados PII com AWS Macie | Gustavo Rorato</a></p>
</li>
<li><p><a target="_blank" href="https://thenewstack.io/ebpf-foundation-releases-security-threat-model-and-audit-reports/">eBPF Foundation Releases Security Threat Model and Audit Reports | TheNewStack</a></p>
</li>
<li><p><a target="_blank" href="https://socket.dev/blog/supply-chain-attacks-targeting-llm-application-developers">Supply Chain Attacks Targeting LLM Application Developers: The Hidden Dangers of Fake Open Source Packages | Socket.dev</a></p>
</li>
<li><p><a target="_blank" href="https://www.gyan.ca/the-future-application-security-engineer/">The Future Application Security Engineer | Gyan Security</a></p>
</li>
<li><p><a target="_blank" href="https://xbow.com/blog/xbow-2fauth-ssrf/">SSRF &amp; URI validation bypass in 2FAuth | XBOW</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/google/magika">Magika - Detect file content types with deep learning | Google</a></p>
</li>
<li><p><a target="_blank" href="https://zero.checkmarx.com/supply-chain-attack-using-ethereum-smart-contracts-to-distribute-multi-platform-malware-b01ab62b3bab">Supply Chain Attack Using Ethereum Smart Contracts to Distribute Multi-Platform Malware | Checkmarx Zero</a></p>
</li>
<li><p><a target="_blank" href="https://training.linuxfoundation.org/training/developing-secure-software-lfd121/?utm_source=tldrsec.com&amp;utm_medium=referral&amp;utm_campaign=tl-dr-sec-255-ai-finds-0day-in-sqlite-cloud-security-tools-auto-generate-terraform-secure-guardrails">Developing Secure Software (LFD121) - Course Free | The Linux Foundation</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0037]]></title><description><![CDATA[E chegamos a mais uma edição da nossa newsletter!
Vídeo Novo no canal Guia de AppSec
https://www.youtube.com/watch?v=-lLgMupOqIw
 
Links

🎖️ Google | If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development ...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0037</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0037</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 25 Oct 2024 00:18:31 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1729815467413/c6bcfec9-5887-4fd8-851c-8016cc5b7079.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>E chegamos a mais uma edição da nossa newsletter!</p>
<h3 id="heading-video-novo-no-canal-guia-de-appsec">Vídeo Novo no canal Guia de AppSec</h3>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=-lLgMupOqIw">https://www.youtube.com/watch?v=-lLgMupOqIw</a></div>
<p> </p>
<h3 id="heading-links">Links</h3>
<ul>
<li><p>🎖️ <a target="_blank" href="https://storage.googleapis.com/gweb-research2023-media/pubtools/5955.pdf">Google | If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening</a></p>
</li>
<li><p><a target="_blank" href="https://aws.amazon.com/pt/blogs/security/how-to-build-your-own-security-guardians-program/">AWS | How to build a Security Guardians program to distribute security ownership</a></p>
</li>
<li><p><a target="_blank" href="https://app.santanderopenacademy.com/pt/program/santander-bootcamp-ciberseguranca-2">Santander Bootcamp Cibersegurança #2</a></p>
</li>
<li><p><a target="_blank" href="https://fidoalliance.org/fido-alliance-publishes-new-specifications-to-promote-user-choice-and-enhanced-ux-for-passkeys/">FIDO | FIDO Alliance Publishes New Specifications to Promote User Choice and Enhanced UX for Passkeys</a></p>
</li>
<li><p><a target="_blank" href="https://semgrep.dev/blog/2024/easily-create-custom-sast-guardrails-with-human-language-and-semgrep-assistant-ai">SEMGREP | Easily create custom SAST guardrails with human language and Semgrep Assistant (AI)</a></p>
</li>
<li><p><a target="_blank" href="https://appsecadventures.blogspot.com/">SHIKIDA | Appsec adventures - Blog</a></p>
</li>
<li><p><a target="_blank" href="https://github.blog/changelog/2024-10-10-epss-scores-in-the-github-advisory-database/">Github | EPSS Scores in the GitHub Advisory Database</a></p>
</li>
<li><p><a target="_blank" href="https://hacken.io/insights/ecdsa/">Hacken | Key Discovery in ECDSA: Understanding Implementation and Security Risk</a></p>
</li>
<li><p><a target="_blank" href="https://tiagotavares.io/blog/vulnerability_management_jira_context_offsec_appsec/">Tiago Tavares | Processo de Gestão de Vulnerabilidades e Automação para OffSec e AppSec Utilizando Atlassian Jira: Proposta e Tutorial</a></p>
</li>
<li><p><a target="_blank" href="https://sysdig.com/blog/runtime-is-the-way/">Sysdig | Runtime Is The Way</a></p>
</li>
<li><p><a target="_blank" href="https://medium.com/mitre-engenuity/threat-informed-defense-to-secure-ai-722716acf45e">Mitre-Engenuity | Threat-Informed Defense to Secure AI</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0036]]></title><description><![CDATA[Links

URL validation bypass cheat sheet | PortSwigger

Learn AWS Pentesting | Tyler Ramsbey

Burp Suite - Deep Dive | Cristi Vlad

Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information

SaaS attack techniques

CAPEC-STRIDE...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0036</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0036</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[cloudsecurity]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Tue, 10 Sep 2024 01:35:25 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1725932085521/e15d84f1-e50b-4a3e-ae66-5252b5573bba.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p><a target="_blank" href="https://portswigger.net/web-security/ssrf/url-validation-bypass-cheat-sheet">URL validation bypass cheat sheet | PortSwigger</a></p>
</li>
<li><p><a target="_blank" href="https://www.youtube.com/playlist?app=desktop&amp;list=PLMoaZm9nyKaNRN0SoR_PBVYc_RAhbZdG4&amp;si=w9DowKDlYt071M9P">Learn AWS Pentesting | Tyler Ramsbey</a></p>
</li>
<li><p><a target="_blank" href="https://www.youtube.com/playlist?list=PLonlF40eS6nzPfbOv5NHv5SpUOcPH7daP">Burp Suite - Deep Dive | Cristi Vlad</a></p>
</li>
<li><p><a target="_blank" href="https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/">Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/pushsecurity/saas-attacks">SaaS attack techniques</a></p>
</li>
<li><p><a target="_blank" href="https://www.ostering.com/blog/2022/03/07/capec-stride-mapping/">CAPEC-STRIDE Mapping</a></p>
</li>
<li><p><a target="_blank" href="https://portswigger.net/research/gotta-cache-em-all">Gotta cache 'em all: bending the rules of web cache exploitation</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0035]]></title><description><![CDATA[Vídeo novo no canal!
https://www.youtube.com/watch?v=iQ-TcXrf8BE
 
Links

Splitting the email atom: exploiting parsers to bypass access controls

Using AI for Offensive Security

Bypassing API rate limiting using IP rotation in Burp Suite

TruffleHog...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0035</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0035</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 09 Aug 2024 23:10:06 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1723244962098/04898791-d50a-42c3-9be3-d7cb93e29714.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-video-novo-no-canal">Vídeo novo no canal!</h3>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=iQ-TcXrf8BE">https://www.youtube.com/watch?v=iQ-TcXrf8BE</a></div>
<p> </p>
<h3 id="heading-links">Links</h3>
<ul>
<li><p><a target="_blank" href="https://portswigger.net/research/splitting-the-email-atom">Splitting the email atom: exploiting parsers to bypass access controls</a></p>
</li>
<li><p><a target="_blank" href="https://cloudsecurityalliance.org/artifacts/using-ai-for-offensive-security">Using AI for Offensive Security</a></p>
</li>
<li><p><a target="_blank" href="https://danaepp.com/bypassing-api-rate-limiting-using-ip-rotation-in-burp-suite">Bypassing API rate limiting using IP rotation in Burp Suite</a></p>
</li>
<li><p><a target="_blank" href="https://trufflesecurity.com/blog/trufflehog-now-analyzes-permissions-of-api-keys-and-passwords">TruffleHog Now Analyzes Permissions Of API Keys and Passwords</a></p>
</li>
<li><p><a target="_blank" href="https://doubleagent.net/onavo-facebook-ssl-mitm-technical-analysis/">How did Facebook intercept their competitor's encrypted mobile app traffic?</a></p>
</li>
<li><p><a target="_blank" href="https://docs.datadoghq.com/developers/ide_plugins/vscode/#static-analysis">Datadog Extension for Visual Studio Code</a></p>
</li>
<li><p><a target="_blank" href="https://shostack.org/files/papers/Fast-Cheap-and-Good.pdf">Fast, Cheap and Good | An Unusual Trade-off Available in Threat Modeling by Adam Shostack</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0034]]></title><description><![CDATA[Links

🚨 ZAP | Polyfill.io Script Detection

Not The Hidden Wiki - The largest repository of links related to cybersecurity

PLORMBING YOUR DJANGO ORM

Kubernetes Cluster Security - Nuclei Templates v9.9.0

Cloud Commotion intends to cause chaos to ...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0034</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0034</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[AI]]></category><category><![CDATA[Kubernetes]]></category><category><![CDATA[Cloud]]></category><category><![CDATA[Django]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 30 Jun 2024 13:40:22 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1719754741801/b094fd16-3430-4e0c-83ea-d10c91886211.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>🚨 <a target="_blank" href="https://www.zaproxy.org/blog/2024-06-27-polyfill.io-script-detection/">ZAP | Polyfill.io Script Detection</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/notthehiddenwiki/NTHW">Not The Hidden Wiki - The largest repository of links related to cybersecurity</a></p>
</li>
<li><p><a target="_blank" href="https://www.elttam.com/blog/plormbing-your-django-orm/">PLORMBING YOUR DJANGO ORM</a></p>
</li>
<li><p><a target="_blank" href="https://blog.projectdiscovery.io/kubernetes/">Kubernetes Cluster Security - Nuclei Templates v9.9.0</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/SecurityRunners/CloudCommotion">Cloud Commotion intends to cause chaos to simulate security incidents</a></p>
</li>
<li><p><a target="_blank" href="https://security.apple.com/blog/private-cloud-compute/">Private Cloud Compute: A new frontier for AI privacy in the cloud</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0033]]></title><description><![CDATA[Links

Agile Manifesto for a Holistic AppSec Environment | Synopsys

What is Kyverno?- Policy Management using Kyverno

🎖️ https://github.com/danielmiessler/fabric | open-source framework for augmenting humans using AI

The state of AppSec: Are we g...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0033</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0033</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Wed, 05 Jun 2024 01:11:42 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1717549777682/7b57bbe9-5660-4755-9526-0bc1cfb0efe7.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p><a target="_blank" href="https://www.synopsys.com/content/dam/synopsys/sig-assets/ebooks/agile-security-manifesto.pdf">Agile Manifesto for a Holistic AppSec Environment | Synopsys</a></p>
</li>
<li><p><a target="_blank" href="https://harshalr.hashnode.dev/what-is-kyverno-policy-management-using-kyverno">What is Kyverno?- Policy Management using Kyverno</a></p>
</li>
<li><p>🎖️ <a target="_blank" href="https://github.com/danielmiessler/fabric">https://github.com/danielmiessler/fabric</a> | open-source framework for augmenting humans using AI</p>
</li>
<li><p><a target="_blank" href="https://securityboulevard-com.cdn.ampproject.org/c/s/securityboulevard.com/2024/05/the-state-of-appsec-are-we-getting-ahead-of-attackers-or-falling-behind/amp/">The state of AppSec: Are we getting ahead of attackers — or falling behind?</a></p>
</li>
<li><p><a target="_blank" href="https://github.blog/2024-05-29-github-and-jfrog/">GitHub and JFrog partner to unify code and binaries for DevSecOps</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/prowler-cloud/prowler">https://github.com/prowler-cloud/prowler</a> | Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes.</p>
</li>
<li><p><a target="_blank" href="https://danaepp.com/writing-burp-extensions-in-kotlin">Writing Burp extensions in Kotlin</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3918405246/">Analista de Segurança da Informação Sênior | AppSec</a> | Conta Simples</p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3934615040/">DevSecOps</a> | Mutant</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0032]]></title><description><![CDATA[Estão abertas as inscrições para a Conviso Academy! Uma formação em AppSec gratuita (com vagas limitadas)! Faça já sua inscrição (link abaixo)!
https://www.youtube.com/watch?v=lXiU38CUiTw
 
Links

🎖️ Conviso Academy | Formação em AppSec gratuita

De...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0032</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0032</guid><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[appsec]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[academy]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 19 May 2024 13:27:27 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1716125158780/01c3ff76-fd02-43d7-990e-cbd9b26a3e5a.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Estão abertas as inscrições para a <strong>Conviso Academy</strong>! Uma formação em AppSec gratuita (com vagas limitadas)! Faça já sua inscrição (link abaixo)!</p>
<div class="embed-wrapper"><div class="embed-loading"><div class="loadingRow"></div><div class="loadingRow"></div></div><a class="embed-card" href="https://www.youtube.com/watch?v=lXiU38CUiTw">https://www.youtube.com/watch?v=lXiU38CUiTw</a></div>
<p> </p>
<h3 id="heading-links">Links</h3>
<ul>
<li><p>🎖️ <a target="_blank" href="https://www.convisoappsec.com/pt-br/conviso-academy">Conviso Academy</a> | Formação em AppSec gratuita</p>
</li>
<li><p><a target="_blank" href="https://resilientcyber.substack.com/p/defending-cicd-environments-the-nsacisa">Defending CI/CD Environments - The NSA/CISA Way</a></p>
</li>
<li><p><a target="_blank" href="https://www.appsecengineer.com/blog/41-thought-leaders-in-infosec-to-watch-in-2024">41 Thought Leaders in InfoSec to Watch in 2024</a></p>
</li>
<li><p><a target="_blank" href="https://github.blog/changelog/2024-05-13-dependabot-core-is-now-open-source-with-an-mit-license/">dependabot-core is now open source with an MIT license</a></p>
</li>
<li><p><a target="_blank" href="https://www.youtube.com/watch?v=MgU-uBmysNE">Deep Dive into Falco: Empower DevSecOps with Real-time Container Security</a></p>
</li>
<li><p><a target="_blank" href="https://danaepp.com/is-bruno-good-for-api-hacking">Is Bruno a good Postman alternative for API hacking?</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/jassics/security-study-plan/tree/main">jassics/security-study-plan</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3924586342/">Contabilizei | Analista de Segurança da Informação Sênior - AppSec</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3926849481/">Ambev Tech | Analista de Segurança da Informação Sênior (AppSec)</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0031]]></title><description><![CDATA[Olá pessoal! Venho nesta edição da nossa newsletter fazer um pedido especial:
No estado do Rio Grande do Sul (onde eu moro) tivemos uma das maiores catástrofes de sua história.Devido as enchentes em diversas cidades, muitas pessoas (muitas mesmo) per...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0031</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0031</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 10 May 2024 01:33:13 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1715304387136/67849e54-a44b-46fb-aeb2-8216976b97fa.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Olá pessoal! Venho nesta edição da nossa newsletter fazer um pedido especial:</p>
<p>No estado do Rio Grande do Sul (onde eu moro) tivemos uma das maiores catástrofes de sua história.<br />Devido as enchentes em diversas cidades, muitas pessoas (muitas mesmo) perderam tudo, estão desabrigadas e precisando de apoio.</p>
<p>A <a target="_blank" href="https://www.linkedin.com/posts/wsssecurity_proximidade-wss-ajuda-rs-activity-7192664008787734528-Wwmu?utm_source=share&amp;utm_medium=member_desktop">WSS Security</a> está com um PIX para arrecadar fundos para ajudarmos aos mais necessitados.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1715304715951/0bbb5702-232b-49a6-ba03-2f56994e506f.png" alt class="image--center mx-auto" /></p>
<h3 id="heading-links">Links</h3>
<ul>
<li><p>🎖️ <a target="_blank" href="https://github.com/projectdiscovery/nuclei-templates/releases/tag/v9.8.5">Nuclei Templates for AWS Cloud Config Review</a></p>
</li>
<li><p><a target="_blank" href="https://academy.semgrep.dev/">Semgrep Academy</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/HexaCluster/pgdsat?utm_source=tldrsec.com&amp;utm_medium=referral&amp;utm_campaign=tl-dr-sec-230-bsidessf-rsa-summaries-cloud-native-threat-modeling-gpt-sts-for-github">HexaCluster/pgdsat | PostgreSQL Database Security Assessment Tool</a></p>
</li>
<li><p><a target="_blank" href="https://blog.projectdiscovery.io/hacking-apple-with-sql-injection/">Hacking Apple - SQL Injection to Remote Code Execution</a></p>
</li>
<li><p><a target="_blank" href="https://medium.com/mitre-attack/attack-v15-26685f300acc">ATT&amp;CK v15 Brings the Action: Upgraded Detections, New Analytic Format, &amp; Cross-Domain Adversary Insights</a></p>
</li>
<li><p><a target="_blank" href="https://github.blog/2024-05-02-dependabot-on-github-actions-and-self-hosted-runners-is-now-generally-available/">Dependabot on GitHub Actions and self-hosted runners is now generally available</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3909017169/">Stone | [Risk Platform] Arquiteto de Segurança em Desenvolvimento - Senior</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3909346086/?alternateChannel=search&amp;refId=kk81n5TMx4pI37a536kTpw%3D%3D&amp;trackingId=K6fAL1XDvF0PrJcueNGSIw%3D%3D">Mercado Livre | Senior Cyber Engineer - Security Education</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0030]]></title><description><![CDATA[Links

🎖️ 8KSEC | Advanced Frida Series For Mobile Security Enthusiasts

CISA | Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Security-by-Default

Kubenomicon | Kubernetes from an offensive perspect...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0030</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0030</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 26 Apr 2024 23:30:41 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1714174178575/c0f8441e-86d5-4b4a-bffa-eec6e6e11eeb.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>🎖️ <a target="_blank" href="https://8ksec.io/advanced-frida-mobile/">8KSEC | Advanced Frida Series For Mobile Security Enthusiasts</a></p>
</li>
<li><p><a target="_blank" href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf">CISA | Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Security-by-Default</a></p>
</li>
<li><p><a target="_blank" href="https://kubenomicon.com/">Kubenomicon | Kubernetes from an offensive perspective</a></p>
</li>
<li><p><a target="_blank" href="https://aws.amazon.com/pt/blogs/aws-brasil/configurando-uma-pipeline-de-ci-cd-segura-em-uma-amazon-virtual-private-cloud-sem-acesso-a-internet/">AWS | Configurando uma pipeline de CI/CD segura em uma Amazon Virtual Private Cloud sem acesso a internet</a></p>
</li>
<li><p><a target="_blank" href="https://github.com/bensadeh/tailspin">Tailspin | A log file highligher</a></p>
</li>
<li><p><a target="_blank" href="https://8ksec.io/securing-flutter-applications/">8KSEC | Securing Flutter Applications</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3910914666/">Remote | Application Security Manager</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3903354052/">Conviso | Senior Application Security Consultant</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0029]]></title><description><![CDATA[Links

[artigo] Three key learnings for AppSec teams from the XZ backdoor

[wiki] ../../../../hacking_methodology

[artigo] Passkeys – under the hood

[tutorial] Kubernetes Threat Detection with Kubescape, Prometheus, and Grafana

🎖️ [repo] A basic ...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0029</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0029</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Wed, 10 Apr 2024 12:00:21 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1712714352725/9b13d338-1d31-4ca6-b537-a66f0cbdc23c.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>[artigo] <a target="_blank" href="https://semgrep.dev/blog/2024/three-key-learnings-for-appsec-teams-from-the-xz-backdoor">Three key learnings for AppSec teams from the XZ backdoor</a></p>
</li>
<li><p>[wiki] <a target="_blank" href="https://0xxyc.gitbook.io/hacking_methodology">../../../../hacking_methodology</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://research.kudelskisecurity.com/2024/03/14/passkeys-under-the-hood/">Passkeys – under the hood</a></p>
</li>
<li><p>[tutorial] <a target="_blank" href="https://araji.medium.com/proactive-kubernetes-security-unlocking-threat-detection-with-kubescape-prometheus-and-grafana-ad69593998fd">Kubernetes Threat Detection with Kubescape, Prometheus, and Grafana</a></p>
</li>
<li><p>🎖️ [repo] <a target="_blank" href="https://github.com/pilcrowOnPaper/copenhagen">A basic guideline on implementing auth for the web</a></p>
</li>
<li><p>[curso] <a target="_blank" href="https://openssf.org/training/securing-projects-with-openssf-scorecard-course/?utm_content=287036701&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-76521837">Securing Projects with OpenSSF Scorecard Course</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://8ksec.io/securing-flutter-applications/">Securing Flutter Applications</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3875034877/">Contabilizei :: Analista de Segurança da Informação Sênior (Segurança de Produto)</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3875929226/?alternateChannel=search&amp;refId=HKEZbauYvkJlsnkzt4U7zA%3D%3D&amp;trackingId=xdA4qPDddY1owjKL6BWMCg%3D%3D&amp;trk=d_flagship3_search_srp_jobs">Neon :: Senior DevSecOps</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0028]]></title><description><![CDATA[Links

[tool] threatcl/threatcl: Documenting your Threat Models with HCL

[tool] aquasecurity/chain-bench: An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.

...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0028</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0028</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 29 Mar 2024 14:14:46 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1711685677051/870b78a3-d208-4702-b87f-0ac22899c271.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>[tool] <a target="_blank" href="https://github.com/threatcl/threatcl">threatcl/threatcl: Documenting your Threat Models with HCL</a></p>
</li>
<li><p>[tool] <a target="_blank" href="https://github.com/aquasecurity/chain-bench">aquasecurity/chain-bench: An open-source tool for auditing your software supply chain stack for security compliance based on a new CIS Software Supply Chain benchmark.</a></p>
</li>
<li><p>[video] <a target="_blank" href="https://www.linkedin.com/events/7175751572528766976/comments/">Webinar: Rapid Threat Modeling with GenAI and LLMs</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://thenewstack.io/product-security-plans-what-they-are-and-why-they-matter/">Product Security Plans: What They Are and Why They Matter</a></p>
</li>
<li><p>[video] <a target="_blank" href="https://www.youtube.com/watch?v=C_5KRqQrGD4">Secure LLM Architecture - Testing LLM Guard</a></p>
</li>
<li><p>[wiki] <a target="_blank" href="https://riskbasedprioritization.github.io/">Risk Based Prioritization</a></p>
</li>
<li><p>[tool] <a target="_blank" href="https://www.sonatype.com/products/sonatype-sbom-manager?utm_campaign=organic+social&amp;utm_source=linkedin&amp;utm_medium=social">sonatype SBOM manager</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://www.jit.io/blog/the-essential-components-of-a-devsecops-pipeline">Jit | The Essential Components of a DevSecOps Pipeline</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3872562173/">Loggi - Senior Cybersecurity Manager (App Sec &amp; SOC)</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3872417355/">Compass UOL - Security Champion | Senior</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0027]]></title><description><![CDATA[Links

[artigo] Opening Pandora’s box - Supply Chain Insider Threats in Open Source projects

[artigo] Docker Security – Step-by-Step Hardening (Docker Hardening) (um dos guias mais completos que já vi)

[ferramenta] Secret scanning AI-generated cust...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0027</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0027</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[Security]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[Artificial Intelligence]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Sun, 17 Mar 2024 15:22:41 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1710688919085/537f7dc4-c9f2-4992-bf49-12d4953a3757.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>[artigo] <a target="_blank" href="https://boostsecurity.io/blog/opening-pandora-box-supply-chain-insider-threats-in-oss-projects">Opening Pandora’s box - Supply Chain Insider Threats in Open Source projects</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://reynardsec.com/en/docker-platform-security-step-by-step-hardening/">Docker Security – Step-by-Step Hardening (Docker Hardening)</a> (um dos guias mais completos que já vi)</p>
</li>
<li><p>[ferramenta] <a target="_blank" href="https://github.blog/changelog/2024-03-12-secret-scanning-ai-generated-custom-patterns-public-beta/">Secret scanning AI-generated custom patterns (public beta) by Github</a></p>
</li>
<li><p>[processo] <a target="_blank" href="https://www.cisa.gov/resources-tools/resources/secure-software-development-attestation-form">CISA Secure Software Development Attestation Form</a></p>
</li>
<li><p>[repositório] <a target="_blank" href="https://github.com/dagheyman/awesome-product-security">Awesome Product Security</a></p>
</li>
<li><p>[IA] <a target="_blank" href="https://blog.cloudflare.com/firewall-for-ai">Cloudflare announces Firewall for AI</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3851541724/?refId=Yoi1A0lMkiheFHjrXWhUaA%3D%3D&amp;trackingId=Yoi1A0lMkiheFHjrXWhUaA%3D%3D">Hakai | Engenheiro de AppSec/DevSecOps (PL e SR)</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3844611264/?eBP=CwEAAAGOTP22PFlUl8e1O0Pamw-_bMEo2wL-S1PcfamTkQCHkm6C6crROiwvIcVbQpjdLNWaLfnibkakmTHmYPB9Gqyl26DL-1QTtz-UDd0XV2cSuY_2Icgr1T9EjBSvp_6rxtqAx5Z8mNbYqLgLSPAkREexCK4KV3L2B38dSoqerArN-Wv-5EZCEGQ1PBCZgDJFjM7UpFjE0R49uvCQktNcZN5fDqEbfdtOZLHHTQACj7QV4WR2vXfrLqZJ7zUSnhZg75LPLbaMrc2GZtHhIVTIn-Ozf5sNiF-JvdKQZt-J_8NVIZfIeEVVF_xTLx8GCH-kIdMpaMO9bbwbUiVCpXo5AYE0wOQO0__84L2qrXgLFyroT5tC7BFcynYNWLRfhaItXgWE16aEjvKMEIEhUXxeq2CBfZxHzw&amp;refId=84%2Bo2Jdg%2BV3j%2BLw%2FLPFtjw%3D%3D&amp;trackingId=L1IVJCm7IlzIv0swj3eBNw%3D%3D&amp;trk=flagship3_search_srp_jobs">Luxoft | Application Security Specialist</a></p>
</li>
<li><p><a target="_blank" href="https://www.linkedin.com/jobs/view/3830995085/?eBP=CwEAAAGOTP2xfRpLNXl6RaRW5_bkCL7eX5r3Rg33v0dsOth_kg03c1r8ff4taMCJnmGRt6QLiLiT1emAweyXdUi-rlRqRmZjJNOhuDAyTFBuUMdX19S664l1oCsS9h7IAfQPWOaElrf4phO0al-5_k3mRLyLigEnmybidtQP6Qkq9D2SskupNcCXMEjXVK483gT_0lR-x3NScgKuOWu8VD10MPRaNF0_JAE0F24RX-cLrazX0AMjzYnJis3ZlcCUiE5yifNRZ6mM7DXBkzmiduyObTMcpUn7RxyGGGSXM-hFAkSHl6kyZRu5VIn6_5ahBpC4k9XByvNIdBiooJqnRO3uEDU8l1pD5nTaAgfvMai4qxcD5e-MjYBNw2OoJa2SZrtJuCzNKFlAWpIcbagm3QpU-Q&amp;refId=q87g%2BeyRvydy0Qs7mU3taQ%3D%3D&amp;trackingId=w0mwXWF0dJU%2FwgUHx2yBzw%3D%3D&amp;trk=flagship3_search_srp_jobs">Stefanini | DevSecOps Pl</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0026]]></title><description><![CDATA[Links

[artigo] Advanced End-to-End DevSecOps Kubernetes Three-Tier Project using AWS EKS, ArgoCD, Prometheus, Grafana, and Jenkins

[webinar] How to Scale a High-Performing Cybersecurity Team

[tool] Announcing the General Availability of OpenZeppel...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0026</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0026</guid><category><![CDATA[appsec]]></category><category><![CDATA[DevSecOps]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Fri, 01 Mar 2024 02:18:45 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1709259483522/ea60c22f-c504-4fd2-a756-b1ffc63ccd77.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>[artigo] <a target="_blank" href="https://blog.stackademic.com/advanced-end-to-end-devsecops-kubernetes-three-tier-project-using-aws-eks-argocd-prometheus-fbbfdb956d1a">Advanced End-to-End DevSecOps Kubernetes Three-Tier Project using AWS EKS, ArgoCD, Prometheus, Grafana, and Jenkins</a></p>
</li>
<li><p>[webinar] <a target="_blank" href="https://www.offsec.com/resources/webinar-replay/how-to-scale-a-high-performing-cybersecurity-team/?submissionGuid=86b995b7-9921-4ae1-8fc1-6b51ee00b5ee">How to Scale a High-Performing Cybersecurity Team</a></p>
</li>
<li><p>[tool] <a target="_blank" href="https://blog.openzeppelin.com/announcing-the-general-availability-of-openzeppelin-defender?_gl=1*ykje20*_ga*Wm1HMnVNRjZsXzlsa2RBNzlBZkpqVGpBZnF0bk5KdVBwSGRuaDM3dC1UX3ZpTFhrQzlUaXFuY2JaWDBVZ0xjdQ..*_ga_1LER5JVNB5*MTcwOTI1ODk1NC4yLjEuMTcwOTI1ODk1NC4wLjAuMA..">Announcing the General Availability of OpenZeppelin Defender: A New Era in Blockchain Security and Operations</a></p>
</li>
<li><p>[course] <a target="_blank" href="https://tryhackme.com/r/resources/blog/devsecops-learning-path">TryHackMe | Our New DevSecOps Learning Path Has Landed!</a></p>
</li>
<li><p>[framework] <a target="_blank" href="https://prods.ec/">OWASP Product Security Capability Framework</a></p>
</li>
<li><p>[newsletter] <a target="_blank" href="https://tldrsec.com/p/tldr-sec-220">tl;dr sec #220 - Detecting Manual AWS Actions, AI Threat Models, Living Off the False Positive</a></p>
</li>
<li><p>[checklist] <a target="_blank" href="https://owasp.org/www-project-top-10-for-large-language-model-applications/llm-top-10-governance-doc/LLM_AI_Security_and_Governance_Checklist-v1.pdf">OWASP LLM IA Cybersecurity &amp; Governance Checklist</a></p>
</li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[AppSec Newsletter 0025]]></title><description><![CDATA[Links

[academy] Keycloak Academy

[artigo] How Github Scaled Appsec

[newsletter] tl;dr sec #216 - Azure Attack Paths, Recipe for Scaling Security, Cybersecurity Incident Tracker

[tool] RAVEN (Risk Analysis and Vulnerability Enumeration for CI/CD)
...]]></description><link>https://blog.guiadeappsec.com.br/appsec-newsletter-0025</link><guid isPermaLink="true">https://blog.guiadeappsec.com.br/appsec-newsletter-0025</guid><category><![CDATA[appsec]]></category><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[newsletter]]></category><category><![CDATA[DevSecOps]]></category><dc:creator><![CDATA[Ben-Hur Santos Ott]]></dc:creator><pubDate>Tue, 06 Feb 2024 00:59:10 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1707181125093/2c9f08c4-ae5f-4d6c-9be0-463704e34682.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-links">Links</h3>
<ul>
<li><p>[academy] <a target="_blank" href="https://www.keycloak.academy/">Keycloak Academy</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://infoseclearner.beehiiv.com/p/github-scales-appsec">How Github Scaled Appsec</a></p>
</li>
<li><p>[newsletter] <a target="_blank" href="https://tldrsec.com/p/tldr-sec-216">tl;dr sec #216 - Azure Attack Paths, Recipe for Scaling Security, Cybersecurity Incident Tracker</a></p>
</li>
<li><p>[tool] <a target="_blank" href="https://www.kitploit.com/2024/01/raven-cicd-security-analyzer.html">RAVEN (Risk Analysis and Vulnerability Enumeration for CI/CD)</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://infosecwriteups.com/http-request-smuggling-tryhackme-writeup-walkthrough-by-md-amiruddin-9042011e44e0">HTTP Request Smuggling | Tryhackme Writeup/Walkthrough | By Md Amiruddin</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://thenewstack.io/distributed-applications-need-a-consistent-security-posture/">Why Distributed Application Environments Need a Consistent Security Posture</a></p>
</li>
<li><p>[newsletter] <a target="_blank" href="https://pathonproject.com/zb/?197e4f431546d239#Aqoh101o0jpRLM7Dbn5ofNEWQeovRCT17pffAG9RY6U=">AppSec Ezine 519</a></p>
</li>
<li><p>[tool] <a target="_blank" href="https://blog.projectdiscovery.io/announcing-cvemap-from-projectdiscovery/">cvemap by ProjectDiscovery</a></p>
</li>
<li><p>[artigo] <a target="_blank" href="https://blog.aquia.us/blog/2024-01-16-tm-aws-workloads/">The Importance of Threat Modeling for Building Secure Workloads in AWS</a></p>
</li>
</ul>
<h3 id="heading-vagas">Vagas</h3>
<ul>
<li><a target="_blank" href="https://www.linkedin.com/jobs/view/3808402179/">Mercado Livre :: Cyber Security Engineer - Líder Técnico</a></li>
</ul>
<h3 id="heading-siga-o-guia-de-appsec-nas-redes"><strong>Siga o Guia de AppSec nas redes!</strong></h3>
<ul>
<li><p>Youtube: <a target="_blank" href="http://youtube.com/@GuiadeAppSec"><strong>youtube.com/@GuiadeAppSec</strong></a></p>
</li>
<li><p>Twitter / X: <a target="_blank" href="http://twitter.com/guiadeappsec"><strong>twitter.com/guiadeappsec</strong></a></p>
</li>
<li><p>Site: <a target="_blank" href="http://guiadeappsec.com.br/"><strong>guiadeappsec.com.br</strong></a></p>
</li>
</ul>
]]></content:encoded></item></channel></rss>