<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cybersecurity on Sven Ruppert</title><link>https://sven-ruppert.info/tags/cybersecurity/</link><description>Recent content in Cybersecurity on Sven Ruppert</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>sven.ruppert@gmail.com (Sven Ruppert)</managingEditor><webMaster>sven.ruppert@gmail.com (Sven Ruppert)</webMaster><copyright>© 2026 Sven Ruppert</copyright><lastBuildDate>Tue, 07 May 2024 12:43:21 +0000</lastBuildDate><atom:link href="https://sven-ruppert.info/tags/cybersecurity/index.xml" rel="self" type="application/rss+xml"/><item><title>Mastering Secure Error Handling in Java: Best Practices and Strategies</title><link>https://sven-ruppert.info/posts/mastering-secure-error-handling-in-java-best-practices-and-strategies/</link><pubDate>Tue, 07 May 2024 12:43:21 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/mastering-secure-error-handling-in-java-best-practices-and-strategies/</guid><description>&lt;h2 class="relative group"&gt;What is ErrorHandling?
 &lt;div id="what-is-errorhandling" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#what-is-errorhandling" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;Error handling refers to the programming practice of anticipating, detecting, and responding to exceptions or errors in software during its execution. Errors may occur for various reasons, such as invalid user inputs, hardware failures, or bugs in the code. Proper error handling helps ensure that the program can handle such situations gracefully by resolving the Error, compensating for it, or failing safely.&lt;/p&gt;</description></item><item><title>The Hidden Dangers of Bidirectional Characters</title><link>https://sven-ruppert.info/posts/the-hidden-dangers-of-bidirectional-characters/</link><pubDate>Fri, 19 Apr 2024 10:12:58 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/the-hidden-dangers-of-bidirectional-characters/</guid><description>&lt;p&gt;Discover the hidden dangers of bidirectional control characters! We dive deep into how these essential text-rendering tools can be exploited to manipulate digital environments. Learn about their security risks, from filename spoofing to deceptive URLs, and uncover the crucial strategies to safeguard against these subtle yet potent threats. Understand how to protect your systems in a multilingual world. Join to ensure your digital security is not left to chance!&lt;/p&gt;</description></item><item><title>Audio Steganography In More Detail</title><link>https://sven-ruppert.info/posts/audio-steganography-in-more-detail/</link><pubDate>Wed, 17 Apr 2024 19:22:20 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/audio-steganography-in-more-detail/</guid><description>&lt;p&gt;Audio steganography is a technique for hiding information within an audio file so that only the intended recipient knows of the hidden data&amp;rsquo;s existence. This method belongs to the broader field of steganography, which itself is a subset of security systems and comes from the Greek words &amp;ldquo;steganos,&amp;rdquo; meaning covered, and &amp;ldquo;graphein,&amp;rdquo; meaning writing.&lt;/p&gt;</description></item><item><title>Beyond the Visible: Exploring the Depths of Steganography</title><link>https://sven-ruppert.info/posts/beyond-the-visible-exploring-the-depths-of-steganography/</link><pubDate>Thu, 28 Mar 2024 14:02:52 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/beyond-the-visible-exploring-the-depths-of-steganography/</guid><description>&lt;p&gt;Steganography is the practice of concealing a message, file, image, or video within another message, file, image, or video. Unlike cryptography, which focuses on making a message unreadable to unauthorised parties, steganography aims to hide the message&amp;rsquo;s existence. The word &amp;ldquo;&lt;strong&gt;steganography&lt;/strong&gt; &amp;quot; is derived from the Greek words &amp;ldquo;&lt;strong&gt;steganos&lt;/strong&gt; ,&amp;rdquo; meaning &amp;ldquo;&lt;strong&gt;covered&lt;/strong&gt; ,&amp;rdquo; and &amp;ldquo;&lt;strong&gt;graphein&lt;/strong&gt; ,&amp;rdquo; meaning &amp;ldquo;&lt;strong&gt;to write&lt;/strong&gt;.&amp;rdquo;&lt;/p&gt;</description></item><item><title>Serialising in Java - Birds Eye View</title><link>https://sven-ruppert.info/posts/serialising-in-java-birds-eye-view/</link><pubDate>Sun, 11 Feb 2024 13:46:53 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/serialising-in-java-birds-eye-view/</guid><description>&lt;p&gt;Serialisation in Java is implemented to convert the state of an object into a byte stream, which can be quickly persisted to a file or sent over a network. This process is essential for persisting object data, supporting network communication, and facilitating sharing of objects between different parts of a distributed system.&lt;/p&gt;</description></item><item><title>Contextual Analysis in Cybersecurity</title><link>https://sven-ruppert.info/posts/contextual-analysis-in-cybersecurity/</link><pubDate>Mon, 05 Feb 2024 17:49:29 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/contextual-analysis-in-cybersecurity/</guid><description>&lt;p&gt;Contextual analysis in cybersecurity involves examining events, actions, or data within the broader context of an organization&amp;rsquo;s IT environment. It is a critical component of a proactive cybersecurity strategy, aiming to understand the significance of activities by considering various factors surrounding them. This multifaceted approach helps cybersecurity professionals identify and respond to potential threats effectively.&lt;/p&gt;</description></item><item><title>Infection Method - Sub-Domain Takeover</title><link>https://sven-ruppert.info/posts/infection-method-sub-domain-takeover/</link><pubDate>Mon, 20 Nov 2023 14:37:29 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/infection-method-sub-domain-takeover/</guid><description>&lt;p&gt;A subdomain takeover is a type of cybersecurity vulnerability that occurs when an attacker gains control of a subdomain of a website or a domain name. This attack can seriously affect the security and functionality of a web application or website. In this explanation, we&amp;rsquo;ll look at subdomain takeovers, how they work, the risks they pose, and how to prevent them.&lt;/p&gt;</description></item><item><title>Infection Method - Domain Takeover</title><link>https://sven-ruppert.info/posts/infection-method-domain-takeover/</link><pubDate>Fri, 10 Nov 2023 10:31:25 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/infection-method-domain-takeover/</guid><description>&lt;p&gt;In this post, we will look at another method of infection. These are the attack vectors via domain names. This can happen at the main level, i.e. the domain itself, or via sub-domains. But what exactly is a domain takeover attack?&lt;/p&gt;</description></item><item><title>Introduction to the Linux Foundation's SLSA project</title><link>https://sven-ruppert.info/posts/introduction-to-the-linux-foundations-slsa-project/</link><pubDate>Sat, 10 Dec 2022 21:56:43 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/introduction-to-the-linux-foundations-slsa-project/</guid><description>&lt;p&gt;Supply Chain Security is a hot topic these days. And more and more, we as developers are dealing with this daily. But what does this mean for us, and how is this influencing our job? I want to give an overview of common attacks against the Software Supply Chain from the developer&amp;rsquo;s view and will introduce the Open Source project SLSA from the Linux Foundation.&lt;/p&gt;</description></item><item><title>The Power of #JFrog Build Info (Build Metadata)</title><link>https://sven-ruppert.info/posts/the-power-of-jfrog-build-info-build-metadata/</link><pubDate>Fri, 08 Oct 2021 13:42:05 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/the-power-of-jfrog-build-info-build-metadata/</guid><description>&lt;p&gt;&lt;strong&gt;Intro&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This article will take a detailed look at what the term build-info is all about and why it will help us protect against attacks such as the Solarwinds Hack.&lt;/p&gt;</description></item><item><title>SolarWinds hack and the Executive Order from Mr Biden -- And now?</title><link>https://sven-ruppert.info/posts/solarwinds-hack-and-the-executive-order-from-mr-biden-and-now/</link><pubDate>Tue, 27 Jul 2021 11:10:15 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/solarwinds-hack-and-the-executive-order-from-mr-biden-and-now/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In the past two years, we have had to learn a lot about cybersecurity. The new attack vectors are becoming more and more sophisticated and are directed more and more against the value chain in general. But what does that mean for us? What can be done about it, and what reactions have the state already taken?&lt;/p&gt;</description></item><item><title>What is the difference between SAST, DAST, IAST and RASP?</title><link>https://sven-ruppert.info/posts/what-is-the-difference-between-sast-dast-iast-and-rasp/</link><pubDate>Mon, 19 Jul 2021 15:34:30 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/what-is-the-difference-between-sast-dast-iast-and-rasp/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Intro:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this post, we&amp;rsquo;re going to look at the differences between the various cybersecurity defence techniques. Here you can identify four main groups, which we will go through briefly one after another to illustrate the advantages and disadvantages.&lt;/p&gt;</description></item></channel></rss>