Reshift Blog

Get the latest on secure development, security attacks, news, and new product features.


Reshift releases a plugin for IntelliJ IDEA

The reshift  IntelliJ plugin enables developers to find vulnerabilities in their own custom code and help them remediate with rich issue descriptions within the IDE.

Join our DevSec Fridays webinar

A series on best practices, new tools, and talks from industry experts every Friday.

Automatically find and fix vulnerabilities in your own custom code.

Most recent posts


Java attacks

News updates



OWASP Top 10: Injection

Occurs when untrusted data is sent to an interpreter as part of a command or query which can execute unintended commands or access unauthorized data.

OWASP Top 10: Broken Authentication

A result of an inadequately developed login pages, authentication logic, backdoor, custom session management or authentication scheme.

sensitive data exposure

OWASP Top 10: Sensitive Data Exposure

Attackers steal keys, execute man-in-the-middle attacks, or steal clear text data off the server, while in transit, or from the user’s client

Want to check your projects for free?