SlideShare uma empresa Scribd logo
1 de 119
Baixar para ler offline
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Security in Node.js Security 
Liran TalLiran Tal
Developer Advocate @ SnykDeveloper Advocate @ Snyk
@liran_tal github.com/lirantal
May 2019May 2019
@liran_tal
github.com/lirantal
Liran TalLiran Tal
Developer AdvocateDeveloper Advocate
0101 Black Clouds in Node.js SecurityBlack Clouds in Node.js Security
02 02 ||
||
03 03 ||
Common Security VulnerabilitiesCommon Security Vulnerabilities
Silver Linings in Node.js SecuritySilver Linings in Node.js Security
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Securityin Node.js Security
Node.js is JavaScriptNode.js is JavaScript
JavaScript is EverywhereJavaScript is Everywhere
FrontendFrontend
BackendBackend
IoTIoT
DatabasesDatabases
ChatbotsChatbots
MachineMachine
LearningLearning
WebAssemblyWebAssembly
RoboticsRobotics
src: https://snyk.io/opensourcesecurity-2019
Invites big risksInvites big risks
The Biggest RepositoryThe Biggest Repository
Invites big risksInvites big risks
The Biggest RepositoryThe Biggest Repository
Lucrative attack impactLucrative attack impact
Invites big risksInvites big risks
The Biggest RepositoryThe Biggest Repository
Lucrative attack impactLucrative attack impact
Open and free-to-publish ecosystemOpen and free-to-publish ecosystem
Invites big risksInvites big risks
The Biggest RepositoryThe Biggest Repository
Lucrative attack impactLucrative attack impact
Open and free-to-publish ecosystemOpen and free-to-publish ecosystem
Difficult to counter-measureDifficult to counter-measure
Black Clouds inBlack Clouds in
Node.js SecurityNode.js Security
Malicious ModulesMalicious Modules
Black Clouds inBlack Clouds in
Node.js SecurityNode.js Security
Malicious ModulesMalicious Modules
Typosquatting AttacksTyposquatting Attacks
Compromised AccountsCompromised Accounts
Social EngineeringSocial Engineering
Malicious ModulesMalicious Modules
timetime
Jan 2015
rimrafallrimrafall
rimrafallrimrafall
rimrafallrimrafall
Malicious ModulesMalicious Modules
timetime
Jan 2015
rimrafallrimrafall
Jan 2017
crossenvcrossenv
cross-envcross-env
$ npm install crossenv --save
crossenv    !=   cross-envcrossenv    !=   cross-env
$ npm install crossenv --save
coffescript     coffescript      oror      coffe-script      coffe-script 
coffescript     coffescript      oror      coffe-script      coffe-script 
coffeescriptcoffeescript
src: https://snyk.io/vuln
post-install script ✅post-install script ✅
post-install script ✅post-install script ✅
call-home base64 payload ✅call-home base64 payload ✅
How did we find out about this maliciousHow did we find out about this malicious
crossenv package?crossenv package?
post-install script ✅post-install script ✅
call-home base64 payload ✅call-home base64 payload ✅
Malicious ModulesMalicious Modules
timetime
Jan 2015
rimrafallrimrafall
Jan 2017
crossenvcrossenv
May 2018
getcookiesgetcookies
Malicious ModulesMalicious Modules
timetime
Jan 2015
rimrafallrimrafall
Jan 2017
crossenvcrossenv
May 2018
getcookiesgetcookies
Jul 2018
eslint-eslint-
scopescope
eslint-scope 3.7.2eslint-scope 3.7.2
malicious package publishedmalicious package published
eslint-scope 3.7.2eslint-scope 3.7.2
malicious package publishedmalicious package published
What's going on?What's going on?
Who depends on eslint-scope?Who depends on eslint-scope?
Who depends on eslint-scope?Who depends on eslint-scope?
babel-eslintbabel-eslint
Who depends on eslint-scope?Who depends on eslint-scope?
babel-eslintbabel-eslint
eslinteslint
Who depends on eslint-scope?Who depends on eslint-scope?
babel-eslintbabel-eslint
eslinteslint
webpackwebpack
npm invalidates all tokensnpm invalidates all tokens
<= 2018-07-12<= 2018-07-12
 
npm invalidates all tokensnpm invalidates all tokens
<= 2018-07-12<= 2018-07-12
 
estimated potential ~4,500 accounts estimated potential ~4,500 accounts 
were compromised were compromised 
How does something likeHow does something like
this happen?this happen?
Compromised Contributors ?Compromised Contributors ?CompromisedCompromised ContributorsContributors ??
Compromised Contributors ?Compromised Contributors ?
14%14%
compromised npm modulescompromised npm modules
CompromisedCompromised ContributorsContributors ??
src: https://github.com/ChALkeR/notes
Compromised Contributors ?Compromised Contributors ?
20%20%
npm total monthly downloadsnpm total monthly downloads
CompromisedCompromised ContributorsContributors ??
Compromised Contributors ?Compromised Contributors ?
20%20%
npm total monthly downloadsnpm total monthly downloads
expressexpress reactreact
debugdebug
momentmoment
requestrequest
CompromisedCompromised ContributorsContributors ??
https://giphy.com/embed/aWPGuTlDqq2yc
Compromised Contributors ?Compromised Contributors ?
662662 usersusers
123456123456
had their password set tohad their password set to
CompromisedCompromised ContributorsContributors ??
Compromised Contributors ?Compromised Contributors ?
14091409 usersusers
had their password set tohad their password set to
their usernametheir username
CompromisedCompromised ContributorsContributors ??
Compromised Contributors ?Compromised Contributors ?
11%11% usersusers
had their password set tohad their password set to
previously leaked passwordpreviously leaked password
CompromisedCompromised ContributorsContributors ??
Malicious ModulesMalicious Modules
timetime
Jan 2015
rimrafallrimrafall
Jan 2017
crossenvcrossenv
May 2018
getcookiesgetcookies
Jul 2018
eslint-eslint-
scopescope
event-streamevent-stream
Nov 2019
src: https://snyk.io/blog/a-post-mortem-of-the-malicious-event-stream-backdoor
Dependency ManagementDependency Management
Black Clouds inBlack Clouds in
Node.js SecurityNode.js Security
(CC BY-NC-SA 2.0)
OWASP Top 10:OWASP Top 10:
Using Components WithUsing Components With
Known VulnerabilitiesKnown Vulnerabilities
who watches after all thesewho watches after all these
modules ?modules ?
who watches after all thesewho watches after all these
modules ?modules ?
who watches after all thesewho watches after all these
modules ?modules ?
0101 The Scary State of Node.js SecurityThe Scary State of Node.js Security
02 02 ||
||
03 03 ||
Selected Vulnerabilities in Node.jsSelected Vulnerabilities in Node.js
Silver Linings in Node.js SecuritySilver Linings in Node.js Security
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Securityin Node.js Security
Command InjectionCommand Injection
Common SecurityCommon Security
VulnerabilitiesVulnerabilities
Command InjectionCommand Injection
Command InjectionCommand Injection
Command InjectionCommand Injection
DemoDemo
Best Practice:Best Practice:
execFile('git', [...args])execFile('git', [...args])
Command InjectionCommand Injection
Best Practice:Best Practice:
execFile('git', [...args])execFile('git', [...args])
Maintain a whitelist of allowed argsMaintain a whitelist of allowed args
Blacklist special shell chars like ;Blacklist special shell chars like ;
PrayPray
Command InjectionCommand Injection
Regular ExpressionsRegular Expressions
Regular ExpressionsRegular Expressions
Regular ExpressionsRegular Expressions
^([01]?dd?|2[0-4]d|25
[0-5]).([01]?dd?|2[0-4]
d|25[0-5]).([01]?dd?|
2[0-4]d|25[0-5]).([01]?
dd?|2[0-4]d|25[0-5])$
Regular ExpressionsRegular Expressions
^([01]?dd?|2[0-4]d|25
[0-5]).([01]?dd?|2[0-4]
d|25[0-5]).([01]?dd?|
2[0-4]d|25[0-5]).([01]?
dd?|2[0-4]d|25[0-5])$
IP AddressIP Address
Regular ExpressionsRegular Expressions
https://giphy.com/embed/xNBcChLQt7s9a
Regular ExpressionsRegular Expressions
Matching a Song TitleMatching a Song Title
^([a-zA-Z0-9])$^([a-zA-Z0-9])$
Regular ExpressionsRegular Expressions
Matching a Song TitleMatching a Song Title
^([a-zA-Z0-9])$^([a-zA-Z0-9])$^([a-zA-Z0-9]+s?)$^([a-zA-Z0-9]+s?)$
Regular ExpressionsRegular Expressions
Matching a Song TitleMatching a Song Title
^([a-zA-Z0-9])$^([a-zA-Z0-9])$^([a-zA-Z0-9]+s?)$^([a-zA-Z0-9]+s?)$^([a-zA-Z0-9]+s?)+$^([a-zA-Z0-9]+s?)+$
Regular ExpressionsRegular Expressions
Catastrophic BacktrackingCatastrophic Backtracking
Exploits greedy quantifiersExploits greedy quantifiers
Simple regexs are vulnerable tooSimple regexs are vulnerable too
/^(a+)+$//^(a+)+$/
Regular ExpressionsRegular Expressions
20172017 msms||
20162016 MomentMoment||
20182018 ||
20182018 ua-parser-jsua-parser-js|| 20M DL20M DL ||
96M DL96M DL ||
36M DL36M DL ||
sshpksshpk40M DL40M DL ||
Regular ExpressionsRegular Expressions
20172017 msms||
20162016 MomentMoment||
20182018 ||
20182018 ua-parser-jsua-parser-js|| 20M DL20M DL ||
96M DL96M DL ||
36M DL36M DL ||
sshpksshpk40M DL40M DL ||
Best Practices ?Best Practices ?
Regular ExpressionsRegular Expressions
Best Practices ?Best Practices ?
Regular ExpressionsRegular Expressions
Best Practice #1Best Practice #1
DO NOT WRITE YOUR OWN REGEXDO NOT WRITE YOUR OWN REGEX
Regular ExpressionsRegular Expressions
Best Practice #1Best Practice #1
DO NOT WRITE YOUR OWN REGEXDO NOT WRITE YOUR OWN REGEX
Best Practice #2Best Practice #2
DO NOT WRITE YOUR OWN REGEXDO NOT WRITE YOUR OWN REGEX
Regular ExpressionsRegular Expressions
Best Practice #3Best Practice #3
ValidatorValidator Node.js moduleNode.js module
Regular ExpressionsRegular Expressions
Best Practice #4Best Practice #4
Safe-RegexSafe-Regex Node.js moduleNode.js module
const safeRegex = require('safe-regex')
let regex = /^(([a-z])+.)+[A-Z]([a-z])+$/
let isSafe = safeRegex(regex)
0101 The Scary State of Node.js SecurityThe Scary State of Node.js Security
02 02 ||
||
03 03 ||
Selected Vulnerabilities in Node.jsSelected Vulnerabilities in Node.js
Silver Linings in Node.js SecuritySilver Linings in Node.js Security
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Securityin Node.js Security
The npmjs EcosystemThe npmjs Ecosystem
Silver Linings inSilver Linings in
Node.js SecurityNode.js Security
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
FightingFighting TyposquattingTyposquatting
JSONStream   JSONStream    !=!=    jsonstream    jsonstream
Package Moniker RulesPackage Moniker Rules
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
react-nativereact-native
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
react-nativereact-native
reactnativereactnative
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
rea-ct.nativerea-ct.native
react-nativereact-native
reactnativereactnative
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
rea-ct.nativerea-ct.native
react-nativereact-native
reactnativereactnative
react_nativereact_native
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
rea-ct.nativerea-ct.native
react-nativereact-native
reactnativereactnative
react_nativereact_native
   @lirantal/rea-ct.native   @lirantal/rea-ct.native
FightingFighting TyposquattingTyposquatting
Package Moniker RulesPackage Moniker Rules
Package PublishingPackage Publishing NotificationsNotifications
$ npm profile enable-2fa
2FA successfully enabled.
Below are your recovery codes,
please print these out.
2FA tokens2FA tokens for npm >= 5.5.1for npm >= 5.5.1
$ npm profile enable-2fa
2FA successfully enabled.
Below are your recovery codes,
please print these out.
2FA tokens2FA tokens for npm >= 5.5.1for npm >= 5.5.1
TakingTaking OwnershipOwnership ofof
Your App SecurityYour App Security
TakingTaking OwnershipOwnership ofof
Your App SecurityYour App Security
Source: The State of Open Source Security Report 2019, Snyk
https://snyk.io/opensourcesecurity-2019/
FindFind vulnerabilities in vulnerabilities in
open source dependenciesopen source dependencies
$ npm install snyk 
$ snyk auth 
$ snyk test 
FindFind vulnerabilities in vulnerabilities in
open source dependenciesopen source dependencies
$ npm install snyk 
$ snyk auth 
$ snyk test 
FindFind vulnerabilities in vulnerabilities in
open source dependenciesopen source dependencies
SnykSnyk detects vulnerabilitiesdetects vulnerabilities inin
Pull RequestsPull Requests
Snyk automates fixingSnyk automates fixing vulnerabilities vulnerabilities
Node.js Security Working GroupNode.js Security Working Group
Silver Linings inSilver Linings in
Node.js SecurityNode.js Security
The Security WGThe Security WG
The Security WGThe Security WG
ScopeScope
Improving the state of theImproving the state of the
Node.js Security EcosystemNode.js Security Ecosystem
The Security WGThe Security WG
ScopeScope
Improving the state of theImproving the state of the
Node.js Security EcosystemNode.js Security Ecosystem
Incident Response for NodeIncident Response for Node
and the npm ecosystemand the npm ecosystem
The Security WGThe Security WG
Initiative:Initiative: RDP for Ecosystem ModulesRDP for Ecosystem Modules
The Security WGThe Security WG
Initiative:Initiative: RDP for Ecosystem ModulesRDP for Ecosystem Modules
Discretely Investigate Security issuesDiscretely Investigate Security issues
Security Disclosure Policy for Bug HuntersSecurity Disclosure Policy for Bug Hunters
Public Vulnerability DatabasePublic Vulnerability Database
The Security WGThe Security WG
Uninitialized BufferUninitialized Buffer base64urlbase64url|| 2,000,0002,000,000 ||
Initiative:Initiative: RDP for Ecosystem ModulesRDP for Ecosystem Modules
The Security WGThe Security WG
Uninitialized BufferUninitialized Buffer base64urlbase64url|| 2,000,0002,000,000 ||
XSS InjectionXSS Injection react-svgreact-svg|| 130,000130,000 ||
Initiative:Initiative: RDP for Ecosystem ModulesRDP for Ecosystem Modules
The Security WGThe Security WG
Uninitialized BufferUninitialized Buffer base64urlbase64url|| 2,000,0002,000,000 ||
XSS InjectionXSS Injection react-svgreact-svg|| 130,000130,000 ||
Path TraversalPath Traversal serveserve|| 564,000564,000 ||
Initiative:Initiative: RDP for Ecosystem ModulesRDP for Ecosystem Modules
The Security WGThe Security WG
Uninitialized BufferUninitialized Buffer base64urlbase64url|| 2,000,0002,000,000 ||
XSS InjectionXSS Injection react-svgreact-svg|| 130,000130,000 ||
Path TraversalPath Traversal serveserve|| 564,000564,000 ||
ReDOSReDOS protobufjsprotobufjs|| 7,200,0007,200,000 ||
Initiative:Initiative: RDP for Ecosystem ModulesRDP for Ecosystem Modules
0101 Malicious modules & Compromised accountsMalicious modules & Compromised accounts||
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Securityin Node.js Security
||
0101 Malicious modules & Compromised accountsMalicious modules & Compromised accounts
02 02 ||
||
Common Security Pitfalls in Node.jsCommon Security Pitfalls in Node.js
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Securityin Node.js Security
||
||
0101 Malicious modules & Compromised accountsMalicious modules & Compromised accounts
02 02 ||
||
03 03 ||
Common Security Pitfalls in Node.jsCommon Security Pitfalls in Node.js
Developer awareness,Developer awareness,
Fix vulnerabilities in your open source deps,Fix vulnerabilities in your open source deps,
Node.js Security WGNode.js Security WG
Black Clouds & Silver LiningsBlack Clouds & Silver Linings
in Node.js Securityin Node.js Security
||
||
@liran_tal
github.com/lirantal
Liran TalLiran Tal
Developer AdvocateDeveloper Advocate
Use Open Source, Stay Secure.Use Open Source, Stay Secure.
Thank you!Thank you!

Mais conteúdo relacionado

Mais procurados

Metasepi team meeting #20: Start! ATS programming on MCU
Metasepi team meeting #20: Start! ATS programming on MCUMetasepi team meeting #20: Start! ATS programming on MCU
Metasepi team meeting #20: Start! ATS programming on MCUKiwamu Okabe
 
Functional IoT: Hardware and Platform
Functional IoT: Hardware and PlatformFunctional IoT: Hardware and Platform
Functional IoT: Hardware and PlatformKiwamu Okabe
 
Start! ATS programming
Start! ATS programmingStart! ATS programming
Start! ATS programmingKiwamu Okabe
 
Past and today of Metasepi project
Past and today of Metasepi projectPast and today of Metasepi project
Past and today of Metasepi projectKiwamu Okabe
 
Functional IoT: Introduction
Functional IoT: IntroductionFunctional IoT: Introduction
Functional IoT: IntroductionKiwamu Okabe
 
ATS programming on ESP8266
ATS programming on ESP8266ATS programming on ESP8266
ATS programming on ESP8266Kiwamu Okabe
 
Embedded application designed by ATS language
Embedded application designed by ATS languageEmbedded application designed by ATS language
Embedded application designed by ATS languageKiwamu Okabe
 
Functional IoT: Programming Language and OS
Functional IoT: Programming Language and OSFunctional IoT: Programming Language and OS
Functional IoT: Programming Language and OSKiwamu Okabe
 
Static typing and proof in ATS language
Static typing and proof in ATS languageStatic typing and proof in ATS language
Static typing and proof in ATS languageKiwamu Okabe
 
ATS/LF for Coq users
ATS/LF for Coq usersATS/LF for Coq users
ATS/LF for Coq usersKiwamu Okabe
 
Secure Programming Practices in C++ (NDC Oslo 2018)
Secure Programming Practices in C++ (NDC Oslo 2018)Secure Programming Practices in C++ (NDC Oslo 2018)
Secure Programming Practices in C++ (NDC Oslo 2018)Patricia Aas
 
Reading Other Peoples Code (Web Rebels 2018)
Reading Other Peoples Code (Web Rebels 2018)Reading Other Peoples Code (Web Rebels 2018)
Reading Other Peoples Code (Web Rebels 2018)Patricia Aas
 
Soft Dive Into GrimoireLab. Twitter OSS workshop
Soft Dive Into GrimoireLab. Twitter OSS workshopSoft Dive Into GrimoireLab. Twitter OSS workshop
Soft Dive Into GrimoireLab. Twitter OSS workshopManrique Lopez
 
ATS language overview'
ATS language overview'ATS language overview'
ATS language overview'Kiwamu Okabe
 

Mais procurados (15)

Metasepi team meeting #20: Start! ATS programming on MCU
Metasepi team meeting #20: Start! ATS programming on MCUMetasepi team meeting #20: Start! ATS programming on MCU
Metasepi team meeting #20: Start! ATS programming on MCU
 
Functional IoT: Hardware and Platform
Functional IoT: Hardware and PlatformFunctional IoT: Hardware and Platform
Functional IoT: Hardware and Platform
 
Start! ATS programming
Start! ATS programmingStart! ATS programming
Start! ATS programming
 
Past and today of Metasepi project
Past and today of Metasepi projectPast and today of Metasepi project
Past and today of Metasepi project
 
Functional IoT: Introduction
Functional IoT: IntroductionFunctional IoT: Introduction
Functional IoT: Introduction
 
ATS programming on ESP8266
ATS programming on ESP8266ATS programming on ESP8266
ATS programming on ESP8266
 
Embedded application designed by ATS language
Embedded application designed by ATS languageEmbedded application designed by ATS language
Embedded application designed by ATS language
 
Functional IoT: Programming Language and OS
Functional IoT: Programming Language and OSFunctional IoT: Programming Language and OS
Functional IoT: Programming Language and OS
 
Static typing and proof in ATS language
Static typing and proof in ATS languageStatic typing and proof in ATS language
Static typing and proof in ATS language
 
ATS/LF for Coq users
ATS/LF for Coq usersATS/LF for Coq users
ATS/LF for Coq users
 
Applying ML for Log Analysis
Applying ML for Log AnalysisApplying ML for Log Analysis
Applying ML for Log Analysis
 
Secure Programming Practices in C++ (NDC Oslo 2018)
Secure Programming Practices in C++ (NDC Oslo 2018)Secure Programming Practices in C++ (NDC Oslo 2018)
Secure Programming Practices in C++ (NDC Oslo 2018)
 
Reading Other Peoples Code (Web Rebels 2018)
Reading Other Peoples Code (Web Rebels 2018)Reading Other Peoples Code (Web Rebels 2018)
Reading Other Peoples Code (Web Rebels 2018)
 
Soft Dive Into GrimoireLab. Twitter OSS workshop
Soft Dive Into GrimoireLab. Twitter OSS workshopSoft Dive Into GrimoireLab. Twitter OSS workshop
Soft Dive Into GrimoireLab. Twitter OSS workshop
 
ATS language overview'
ATS language overview'ATS language overview'
ATS language overview'
 

Semelhante a Black Clouds & Silver Linings in Node.js Security

Cluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js SecurityCluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js SecurityLiran Tal
 
Node.js security - JS Day Italy 2018
Node.js security - JS Day Italy 2018Node.js security - JS Day Italy 2018
Node.js security - JS Day Italy 2018Liran Tal
 
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP Liran Tal
 
The Container Security Checklist
The Container Security Checklist The Container Security Checklist
The Container Security Checklist LibbySchulze
 
Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...
Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...
Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...Amazon Web Services
 
Effective Doctrine2: Performance Tips for Symfony2 Developers
Effective Doctrine2: Performance Tips for Symfony2 DevelopersEffective Doctrine2: Performance Tips for Symfony2 Developers
Effective Doctrine2: Performance Tips for Symfony2 DevelopersMarcin Chwedziak
 
stackconf 2020 | Speeding up Linux disk encryption by Ignat Korchagin
stackconf 2020 | Speeding up Linux disk encryption by Ignat Korchaginstackconf 2020 | Speeding up Linux disk encryption by Ignat Korchagin
stackconf 2020 | Speeding up Linux disk encryption by Ignat KorchaginNETWAYS
 
DDD on example of Symfony (SfCampUA14)
DDD on example of Symfony (SfCampUA14)DDD on example of Symfony (SfCampUA14)
DDD on example of Symfony (SfCampUA14)Oleg Zinchenko
 
Code Generation in Agile Projects
Code Generation in Agile ProjectsCode Generation in Agile Projects
Code Generation in Agile ProjectsSven Efftinge
 
How to build observability into Serverless (O'Reilly Velocity 2018)
How to build observability into Serverless (O'Reilly Velocity 2018)How to build observability into Serverless (O'Reilly Velocity 2018)
How to build observability into Serverless (O'Reilly Velocity 2018)Yan Cui
 
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por "Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por SegInfo
 
OSMC 2012 | Monitoring with Pacemaker by Martin Gerhard Loschwitz
OSMC 2012 | Monitoring with Pacemaker by Martin Gerhard LoschwitzOSMC 2012 | Monitoring with Pacemaker by Martin Gerhard Loschwitz
OSMC 2012 | Monitoring with Pacemaker by Martin Gerhard LoschwitzNETWAYS
 
Power of linked list
Power of linked listPower of linked list
Power of linked listPeter Hlavaty
 
Rocket Fuelled Cucumbers
Rocket Fuelled CucumbersRocket Fuelled Cucumbers
Rocket Fuelled CucumbersJoseph Wilk
 
Config Management Camp 2017 - If it moves, give it a pipeline
Config Management Camp 2017 - If it moves, give it a pipelineConfig Management Camp 2017 - If it moves, give it a pipeline
Config Management Camp 2017 - If it moves, give it a pipelineMark Rendell
 
Escape the defaults - Configure Sling like AEM as a Cloud Service
Escape the defaults - Configure Sling like AEM as a Cloud ServiceEscape the defaults - Configure Sling like AEM as a Cloud Service
Escape the defaults - Configure Sling like AEM as a Cloud ServiceRobert Munteanu
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developersMITRE ATT&CK
 

Semelhante a Black Clouds & Silver Linings in Node.js Security (20)

Cluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js SecurityCluj JSHeroes 2017 - Liran Tal on Node.js Security
Cluj JSHeroes 2017 - Liran Tal on Node.js Security
 
Node.js security - JS Day Italy 2018
Node.js security - JS Day Italy 2018Node.js security - JS Day Italy 2018
Node.js security - JS Day Italy 2018
 
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
 
The Container Security Checklist
The Container Security Checklist The Container Security Checklist
The Container Security Checklist
 
Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...
Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...
Deep Dive- Log analytics with Amazon Elasticsearch Service - AWS Summit Tel A...
 
Effective Doctrine2: Performance Tips for Symfony2 Developers
Effective Doctrine2: Performance Tips for Symfony2 DevelopersEffective Doctrine2: Performance Tips for Symfony2 Developers
Effective Doctrine2: Performance Tips for Symfony2 Developers
 
stackconf 2020 | Speeding up Linux disk encryption by Ignat Korchagin
stackconf 2020 | Speeding up Linux disk encryption by Ignat Korchaginstackconf 2020 | Speeding up Linux disk encryption by Ignat Korchagin
stackconf 2020 | Speeding up Linux disk encryption by Ignat Korchagin
 
DDD on example of Symfony (SfCampUA14)
DDD on example of Symfony (SfCampUA14)DDD on example of Symfony (SfCampUA14)
DDD on example of Symfony (SfCampUA14)
 
Code Generation in Agile Projects
Code Generation in Agile ProjectsCode Generation in Agile Projects
Code Generation in Agile Projects
 
How to build observability into Serverless (O'Reilly Velocity 2018)
How to build observability into Serverless (O'Reilly Velocity 2018)How to build observability into Serverless (O'Reilly Velocity 2018)
How to build observability into Serverless (O'Reilly Velocity 2018)
 
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por "Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
 
OSMC 2012 | Monitoring with Pacemaker by Martin Gerhard Loschwitz
OSMC 2012 | Monitoring with Pacemaker by Martin Gerhard LoschwitzOSMC 2012 | Monitoring with Pacemaker by Martin Gerhard Loschwitz
OSMC 2012 | Monitoring with Pacemaker by Martin Gerhard Loschwitz
 
Power of linked list
Power of linked listPower of linked list
Power of linked list
 
Commcon 2018
Commcon 2018Commcon 2018
Commcon 2018
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Rocket Fuelled Cucumbers
Rocket Fuelled CucumbersRocket Fuelled Cucumbers
Rocket Fuelled Cucumbers
 
Config Management Camp 2017 - If it moves, give it a pipeline
Config Management Camp 2017 - If it moves, give it a pipelineConfig Management Camp 2017 - If it moves, give it a pipeline
Config Management Camp 2017 - If it moves, give it a pipeline
 
Escape the defaults - Configure Sling like AEM as a Cloud Service
Escape the defaults - Configure Sling like AEM as a Cloud ServiceEscape the defaults - Configure Sling like AEM as a Cloud Service
Escape the defaults - Configure Sling like AEM as a Cloud Service
 
Quick and Solid - Baremetal on OpenStack | Rico Lin
Quick and Solid - Baremetal on OpenStack | Rico LinQuick and Solid - Baremetal on OpenStack | Rico Lin
Quick and Solid - Baremetal on OpenStack | Rico Lin
 
Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 

Mais de Julia Cherniak

"Definition of Done: Deadline driven development" Vitaliy Ratushnyi
"Definition of Done: Deadline driven development" Vitaliy Ratushnyi"Definition of Done: Deadline driven development" Vitaliy Ratushnyi
"Definition of Done: Deadline driven development" Vitaliy RatushnyiJulia Cherniak
 
"Muses Code JS or How Communities Change People" Tanya Butenko
"Muses Code JS or How Communities Change People" Tanya Butenko"Muses Code JS or How Communities Change People" Tanya Butenko
"Muses Code JS or How Communities Change People" Tanya ButenkoJulia Cherniak
 
"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко
"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко
"Принимают за hard skills, увольняют из-за soft skills" Павел ГалушкоJulia Cherniak
 
"It’s about time to embrace Streams" Luciano Mammino
"It’s about time to embrace Streams" Luciano Mammino"It’s about time to embrace Streams" Luciano Mammino
"It’s about time to embrace Streams" Luciano MamminoJulia Cherniak
 
"Node.js and Serverless" Viacheslav Panevskyi
"Node.js and Serverless" Viacheslav Panevskyi"Node.js and Serverless" Viacheslav Panevskyi
"Node.js and Serverless" Viacheslav PanevskyiJulia Cherniak
 
"Lift me up. Mentorship 101" Tanya Butenko
"Lift me up. Mentorship 101" Tanya Butenko"Lift me up. Mentorship 101" Tanya Butenko
"Lift me up. Mentorship 101" Tanya ButenkoJulia Cherniak
 
"Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D...
"Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D..."Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D...
"Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D...Julia Cherniak
 
"The working architecture of NodeJs applications" Viktor Turskyi
"The working architecture of NodeJs applications" Viktor Turskyi"The working architecture of NodeJs applications" Viktor Turskyi
"The working architecture of NodeJs applications" Viktor TurskyiJulia Cherniak
 
"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren
"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren
"The search for App-iness : Progressive Web Apps" Jamie Maria SchourenJulia Cherniak
 
"The Future of Machine Learning & JavaScript"Asim Hussain
"The Future of Machine Learning & JavaScript"Asim Hussain"The Future of Machine Learning & JavaScript"Asim Hussain
"The Future of Machine Learning & JavaScript"Asim HussainJulia Cherniak
 
"ClojureScript journey: from little script, to CLI program, to AWS Lambda fun...
"ClojureScript journey: from little script, to CLI program, to AWS Lambda fun..."ClojureScript journey: from little script, to CLI program, to AWS Lambda fun...
"ClojureScript journey: from little script, to CLI program, to AWS Lambda fun...Julia Cherniak
 

Mais de Julia Cherniak (11)

"Definition of Done: Deadline driven development" Vitaliy Ratushnyi
"Definition of Done: Deadline driven development" Vitaliy Ratushnyi"Definition of Done: Deadline driven development" Vitaliy Ratushnyi
"Definition of Done: Deadline driven development" Vitaliy Ratushnyi
 
"Muses Code JS or How Communities Change People" Tanya Butenko
"Muses Code JS or How Communities Change People" Tanya Butenko"Muses Code JS or How Communities Change People" Tanya Butenko
"Muses Code JS or How Communities Change People" Tanya Butenko
 
"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко
"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко
"Принимают за hard skills, увольняют из-за soft skills" Павел Галушко
 
"It’s about time to embrace Streams" Luciano Mammino
"It’s about time to embrace Streams" Luciano Mammino"It’s about time to embrace Streams" Luciano Mammino
"It’s about time to embrace Streams" Luciano Mammino
 
"Node.js and Serverless" Viacheslav Panevskyi
"Node.js and Serverless" Viacheslav Panevskyi"Node.js and Serverless" Viacheslav Panevskyi
"Node.js and Serverless" Viacheslav Panevskyi
 
"Lift me up. Mentorship 101" Tanya Butenko
"Lift me up. Mentorship 101" Tanya Butenko"Lift me up. Mentorship 101" Tanya Butenko
"Lift me up. Mentorship 101" Tanya Butenko
 
"Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D...
"Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D..."Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D...
"Using Blockchain in Node.js project: JavaScript Ninja’s experience" Maksym D...
 
"The working architecture of NodeJs applications" Viktor Turskyi
"The working architecture of NodeJs applications" Viktor Turskyi"The working architecture of NodeJs applications" Viktor Turskyi
"The working architecture of NodeJs applications" Viktor Turskyi
 
"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren
"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren
"The search for App-iness : Progressive Web Apps" Jamie Maria Schouren
 
"The Future of Machine Learning & JavaScript"Asim Hussain
"The Future of Machine Learning & JavaScript"Asim Hussain"The Future of Machine Learning & JavaScript"Asim Hussain
"The Future of Machine Learning & JavaScript"Asim Hussain
 
"ClojureScript journey: from little script, to CLI program, to AWS Lambda fun...
"ClojureScript journey: from little script, to CLI program, to AWS Lambda fun..."ClojureScript journey: from little script, to CLI program, to AWS Lambda fun...
"ClojureScript journey: from little script, to CLI program, to AWS Lambda fun...
 

Último

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 

Último (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 

Black Clouds & Silver Linings in Node.js Security