Security Knowledge Hub

Best practices, security insights, and expert guidance from the Security Factor 365 team.

Hacking Inalámbrico: Ataques a Wi-Fi, Bluetooth y Protocolos RF

Guía técnica en español sobre las seis superficies inalámbricas, ataques famosos (KRACK, BlueBorne, KNOB, Pixie Dust, RollJam, Crypto1), simulaciones paso a paso, código vulnerable / endurecido, baseline NIST + IEEE 802.11i.

Wireless Hacking Unleashed: Six Surfaces Your AppSec Program Is Probably Missing

Wi-Fi, Bluetooth Classic, BLE, sub-GHz RF, NFC/RFID and IoT transports each have their own threat model. A field guide to wireless threats and what static analysis can actually catch in firmware codebases.

BLE Pairing Pitfalls: Just Works, KNOB, and the Static Mistakes That Make Them Trivial

Why NoInputNoOutput on a sensitive peripheral is malpractice, what KNOB (CVE-2019-9506) actually does, and how to detect insecure BLE pairing decisions before they ship to production.

Wi-Fi WPA Hardening in 2026: KRACK, WPS, PMF and the SSID/PSK Constants You Forgot in Source

WEP and WPA-TKIP should be dead but live on in firmware defaults. WPS is still on. SSIDs and PSKs are checked into git. Here is how to detect them statically and why PMF (802.11w) is non-negotiable.

IoT Firmware Secrets: 10 Patterns Every Connected-Device Codebase Needs to Catch

Azure IoT Hub Device SAS, AWS IoT MQTT endpoints, Particle.io tokens, Tuya cloud secrets, ESP-IDF Wi-Fi credentials, MQTT URLs with embedded passwords. The 2026 cheat sheet for firmware-grade secret detection.

A 24-Control Wireless Security Baseline: Mapping NIST SP 800-153 / 121 / 97 + IEEE 802.11i to Auditable Checks

Wi-Fi, Bluetooth, RF, NFC and IoT each have authoritative guidance — but no one has stitched them into a single auditable framework. Here is one: 24 controls (WIFI / BT / RF / NFC / IOT) you can actually evidence.

Building a Security Audit Skill for Claude Code: AppSec Inside the AI IDE

A zero-install Python skill that turns "scan this repo" into a real enterprise-grade scan. JWT auth, portal persistence, works from any prompt.

From 32 to 81: Rebuilding a Secret Detection Catalog for the AI API Era

Why leaked OpenAI / Anthropic / Hugging Face keys are the supply-chain attacks of 2026, and how to design a precision catalog with 81 vendor-aware patterns.

12-Factor IaC: A Practical Manifesto for Reliable Infrastructure Automation

IaC has hit the same maturity wall app code hit in 2011. A twelve-factor framework for Ansible, Terraform and Kubernetes — with concrete checks you can enforce today.

OpenSSF Malicious Packages: The Feed Your SCA Scanner Needs

Supply-chain attacks bypass every CVE database. Why OpenSSF Malicious Packages is the authoritative feed and how to wire it into any SCA workflow via OSV.dev.

OWASP Top 10 2021: A Complete Guide for Developers

Understanding the most critical web application security risks. From Broken Access Control to SSRF, learn what every developer must know.

The Danger of Hardcoded Secrets: How One API Key Can Compromise Everything

Real-world case studies of breaches caused by exposed credentials in source code. How to detect and prevent secret leaks in your CI/CD pipeline.

SAST vs DAST: Understanding When to Use Each and Why You Need Both

Static and dynamic analysis are complementary, not competing. Learn the strengths of each approach and how ASPM correlation unlocks findings neither can find alone.

Software Supply Chain Attacks: How Malicious Packages Infiltrate npm and PyPI

Typosquatting, dependency confusion, and chainjacking explained. How attackers weaponize open-source registries and how SCA protects you.

Security Log Analysis: Detecting Brute Force, Data Exfiltration, and Slow Attacks

Why static log rules fail against modern attackers. How AI-powered log intelligence detects anomalies humans miss and correlates attack chains in real-time.

SBOM Explained: Why Every Application Needs a Software Bill of Materials

From the US Executive Order on Cybersecurity to EU regulations, SBOM is becoming mandatory. Learn SPDX vs CycloneDX, what to include, and how to automate generation.

PCI DSS v4.0 for Developers: What Changed and What You Need to Do

The new PCI DSS v4.0 requirements for application security. Code review, vulnerability scanning, and the role of automated security testing.

Building a DevSecOps Pipeline: Security Gates That Don't Slow You Down

How to integrate SAST, SCA, and secrets scanning into your CI/CD pipeline without breaking developer velocity. Security policies, automation, and feedback loops.

SQL Injection in 2026: Still the #1 Threat and How to Eliminate It

SQL injection remains in the OWASP Top 10 after 20+ years. Modern detection with parameterized queries, ORMs, and automated SAST scanning.

AI Security: The Attack Surface Your AppSec Program Is Missing

Prompt injection, model poisoning, insecure deserialization, and AI supply chain risks. Why traditional scanners miss AI-specific vulnerabilities and what to do about it.

HTTP Security Headers: The Complete 2026 Checklist (+ Free Scanner Tool)

Master all 10 critical HTTP security headers: CSP, HSTS, X-Frame-Options, and more. Includes a free online scanner to check any website instantly.

How to Analyze Server Logs for Security Threats: A Practical Guide (+ Free Analyzer)

Learn to detect SQL injection, brute-force attacks, XSS, and data exfiltration in server logs. Includes regex patterns and a free online log analyzer.

IAST vs SAST vs DAST: The Complete 2026 Comparison Guide

Understand the differences, strengths, and limitations of each testing method. When to use SAST, DAST, or IAST, and why you need all three.