Skip to content
Close
Login
Login

Code Intelligence Blog

What's new in software testing?

Natalia Kazankova Apr 19, 2024 4:52:45 PM 4 min read

From DAST to dawn: why fuzzing is the better solution

Security testing is an essential element of ...
Start Reading
Antonio Mimmo Mar 28, 2024 10:10:47 AM 3 min read

The top 10 cybersecurity threats in 2024

What can we expect from threat actors this year? ...
Start Reading
Alexander Thiam Oct 26, 2023 2:24:12 PM 11 min read

Top 18 AI Testing Tools in 2024

We curated the top AI testing tools that will ...
Start Reading
Khaled Yakdan Sep 11, 2023 7:16:04 PM 6 min read

Breaking the Barrier of Dynamic Testing: Detect and Autoconfigure Entry Points With CI Spark

CI Spark leverages LLMs to automatically detect ...
Start Reading
Roman Wagner Aug 16, 2023 5:15:00 PM 3 min read

New Vulnerability in tree-kit: Prototype Pollution - CVE-2023-38894

New Prototype Pollution Vulnerability puts ...
Start Reading
Sergej Dechand Aug 9, 2023 2:07:20 PM 6 min read

The Risks of AI-Generated Code

Discover the potential risks and threats posed by ...
Start Reading
Alexander Thiam Jul 13, 2023 7:05:53 PM 16 min read

26 AI Code Tools in 2024: Best AI Coding Assistant

Discover the top AI code tools in 2024 for ...
Start Reading
Roman Wagner Jul 4, 2023 4:16:50 PM 2 min read

New Vulnerability in protobuf.js: Prototype Pollution - CVE-2023-36665

New Prototype Pollution Vulnerability exposes ...
Start Reading
Daniel Teuchert Feb 10, 2023 4:47:30 PM 3 min read

How CI/CD-Integrated Fuzzing Improves Automotive Software Security

Learn about 3 ways how CI/CD-integrated fuzzing ...
Start Reading
Josh Grant Dec 23, 2022 4:44:47 PM 5 min read

An 8-Step Application Security Risk Assessment Checklist for 2024

Learn how to conduct a comprehensive application ...
Start Reading
Sergej Dechand Jan 6, 2021 4:28:30 PM 6 min read

Future of Pentesting: 5 Tips to Improve App Security

In the future, most of the enterprise pentesting ...
Start Reading
Khaled Yakdan Dec 4, 2020 2:54:14 PM 3 min read

Detect & Secure SQL Injections with Fuzzing

Find out how feedback-based fuzzing can be used ...
Start Reading