<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Conviso AppSec</title>
	<atom:link href="https://blog.convisoappsec.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.convisoappsec.com/</link>
	<description>Blog</description>
	<lastBuildDate>Tue, 24 Mar 2026 14:26:48 +0000</lastBuildDate>
	<language>pt-BR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://blog.convisoappsec.com/wp-content/uploads/2022/02/cropped-Icone_fav_Site-512px-32x32.png</url>
	<title>Conviso AppSec</title>
	<link>https://blog.convisoappsec.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">143097206</site>	<item>
		<title>Pentest autônomo com IA: exploração ofensiva real, em escala, para Web e APIs</title>
		<link>https://blog.convisoappsec.com/seguranca-ofensiva/</link>
					<comments>https://blog.convisoappsec.com/seguranca-ofensiva/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 14:26:46 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9447</guid>

					<description><![CDATA[<p>Hoje, anunciamos o lançamento do Pentest Autônomo com IA, uma solução de segurança ofensiva que executa uma abordagem orientada a ataque, inspirada na forma como um pentester conduz uma avaliação manual. Nesse contexto, o pentest...</p>
<p>O post <a href="https://blog.convisoappsec.com/seguranca-ofensiva/">Pentest autônomo com IA: exploração ofensiva real, em escala, para Web e APIs</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/seguranca-ofensiva/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9447</post-id>	</item>
		<item>
		<title>Segurança de aplicações com IA: como apoiar o desenvolvimento seguro</title>
		<link>https://blog.convisoappsec.com/seguranca-de-aplicacoes-com-ia-como-apoiar-o-desenvolvimento-seguro/</link>
					<comments>https://blog.convisoappsec.com/seguranca-de-aplicacoes-com-ia-como-apoiar-o-desenvolvimento-seguro/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 18:29:01 +0000</pubDate>
				<category><![CDATA[Produto]]></category>
		<category><![CDATA[Segurança de Aplicação]]></category>
		<category><![CDATA[appsec]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9334</guid>

					<description><![CDATA[<p>A segurança de aplicações com IA está redefinindo a forma como as empresas desenvolvem software, unindo automação, inteligência e proteção em todo o ciclo de desenvolvimento. Além disso, com a aceleração do desenvolvimento de software...</p>
<p>O post <a href="https://blog.convisoappsec.com/seguranca-de-aplicacoes-com-ia-como-apoiar-o-desenvolvimento-seguro/">Segurança de aplicações com IA: como apoiar o desenvolvimento seguro</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/seguranca-de-aplicacoes-com-ia-como-apoiar-o-desenvolvimento-seguro/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9334</post-id>	</item>
		<item>
		<title>Application Security with AI: How to Support Secure Development</title>
		<link>https://blog.convisoappsec.com/application-security-with-ai-how-to-support-secure-development/</link>
					<comments>https://blog.convisoappsec.com/application-security-with-ai-how-to-support-secure-development/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 18:28:20 +0000</pubDate>
				<category><![CDATA[Segurança de Aplicação]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9341</guid>

					<description><![CDATA[<p>Application security with AI is redefining the way companies build software, combining automation, intelligence, and protection throughout the entire development lifecycle. In addition, as software development accelerates and the pressure for faster delivery grows, artificial...</p>
<p>O post <a href="https://blog.convisoappsec.com/application-security-with-ai-how-to-support-secure-development/">Application Security with AI: How to Support Secure Development</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/application-security-with-ai-how-to-support-secure-development/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9341</post-id>	</item>
		<item>
		<title>Gestão de vulnerabilidades: como atribuir responsabilidades</title>
		<link>https://blog.convisoappsec.com/gestao-de-vulnerabilidades-como-atribuir-responsabilidades/</link>
					<comments>https://blog.convisoappsec.com/gestao-de-vulnerabilidades-como-atribuir-responsabilidades/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 14:38:16 +0000</pubDate>
				<category><![CDATA[Produto]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9293</guid>

					<description><![CDATA[<p>Essa pergunta está no centro de um dos maiores desafios da gestão de vulnerabilidades. Em muitas empresas, falhas permanecem abertas por semanas não porque falte tecnologia, mas porque não há clareza sobre quem deve agir....</p>
<p>O post <a href="https://blog.convisoappsec.com/gestao-de-vulnerabilidades-como-atribuir-responsabilidades/">Gestão de vulnerabilidades: como atribuir responsabilidades</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/gestao-de-vulnerabilidades-como-atribuir-responsabilidades/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9293</post-id>	</item>
		<item>
		<title>Vulnerability Management: How to Assign Responsibilities</title>
		<link>https://blog.convisoappsec.com/vulnerability-management-how-to-assign-responsibilities/</link>
					<comments>https://blog.convisoappsec.com/vulnerability-management-how-to-assign-responsibilities/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 14:37:52 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9300</guid>

					<description><![CDATA[<p>This question lies at the heart of one of the biggest challenges in vulnerability management. In many companies, vulnerabilities remain open for weeks not because of a lack of technology, but because there is no...</p>
<p>O post <a href="https://blog.convisoappsec.com/vulnerability-management-how-to-assign-responsibilities/">Vulnerability Management: How to Assign Responsibilities</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/vulnerability-management-how-to-assign-responsibilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9300</post-id>	</item>
		<item>
		<title>Gestão de vulnerabilidades precisa de contexto</title>
		<link>https://blog.convisoappsec.com/gestao-de-vulnerabilidades-precisa-de-contexto/</link>
					<comments>https://blog.convisoappsec.com/gestao-de-vulnerabilidades-precisa-de-contexto/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Mon, 11 Aug 2025 19:02:45 +0000</pubDate>
				<category><![CDATA[Produto]]></category>
		<category><![CDATA[Segurança de Aplicação]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9257</guid>

					<description><![CDATA[<p>Gestão de vulnerabilidades com base em risco real. Menos ruído, mais clareza e decisões alinhadas ao negócio com o Vuln Intelligence.</p>
<p>O post <a href="https://blog.convisoappsec.com/gestao-de-vulnerabilidades-precisa-de-contexto/">Gestão de vulnerabilidades precisa de contexto</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/gestao-de-vulnerabilidades-precisa-de-contexto/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9257</post-id>	</item>
		<item>
		<title>Como agentes de IA especialista em AppSec aceleram o desenvolvimento seguro</title>
		<link>https://blog.convisoappsec.com/agentes-de-ia-especialistas-em-appsec/</link>
					<comments>https://blog.convisoappsec.com/agentes-de-ia-especialistas-em-appsec/#respond</comments>
		
		<dc:creator><![CDATA[Jecilene Amaro]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 20:16:18 +0000</pubDate>
				<category><![CDATA[Produto]]></category>
		<category><![CDATA[Segurança de Aplicação]]></category>
		<category><![CDATA[appsec]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9228</guid>

					<description><![CDATA[<p>LLMs combinados a agentes especializados em AppSec ajudam a automatizar diagnósticos, priorizar riscos e sugerir correções direto no fluxo de trabalho.</p>
<p>O post <a href="https://blog.convisoappsec.com/agentes-de-ia-especialistas-em-appsec/">Como agentes de IA especialista em AppSec aceleram o desenvolvimento seguro</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/agentes-de-ia-especialistas-em-appsec/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9228</post-id>	</item>
		<item>
		<title>Introdução ao Fuzzing de Componentes Nativos do Android: Estratégias para Criação de Harness</title>
		<link>https://blog.convisoappsec.com/introducao-ao-fuzzing-de-componentes-nativos-do-android-estrategias-para-criacao-de-harness/</link>
					<comments>https://blog.convisoappsec.com/introducao-ao-fuzzing-de-componentes-nativos-do-android-estrategias-para-criacao-de-harness/#respond</comments>
		
		<dc:creator><![CDATA[Thiago Peixoto]]></dc:creator>
		<pubDate>Wed, 22 Jan 2025 19:33:33 +0000</pubDate>
				<category><![CDATA[Code Fighters]]></category>
		<category><![CDATA[Segurança de Aplicação]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9036</guid>

					<description><![CDATA[<p>No artigo anterior, abordamos o mercado de aplicações Android, exploramos conceitos básicos de fuzzing, discutimos o funcionamento dos métodos nativos em aplicações Android e apresentamos a criação de um harness simples para demonstrar o funcionamento...</p>
<p>O post <a href="https://blog.convisoappsec.com/introducao-ao-fuzzing-de-componentes-nativos-do-android-estrategias-para-criacao-de-harness/">Introdução ao Fuzzing de Componentes Nativos do Android: Estratégias para Criação de Harness</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/introducao-ao-fuzzing-de-componentes-nativos-do-android-estrategias-para-criacao-de-harness/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9036</post-id>	</item>
		<item>
		<title>Introduction to Fuzzing Android Native Components: Strategies for Harness Creation</title>
		<link>https://blog.convisoappsec.com/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/</link>
					<comments>https://blog.convisoappsec.com/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/#respond</comments>
		
		<dc:creator><![CDATA[Thiago Peixoto]]></dc:creator>
		<pubDate>Wed, 22 Jan 2025 19:31:28 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Code Fighters]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=9049</guid>

					<description><![CDATA[<p>In the previous article, we covered the Android application market, explored basic fuzzing concepts, discussed how native methods work in Android applications, and introduced the creation of a simple harness to demonstrate the basic functionality...</p>
<p>O post <a href="https://blog.convisoappsec.com/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/">Introduction to Fuzzing Android Native Components: Strategies for Harness Creation</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/introduction-to-fuzzing-android-native-components-strategies-for-harness-creation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9049</post-id>	</item>
		<item>
		<title>From Arbitrary File Write to RCE in Restricted Rails apps</title>
		<link>https://blog.convisoappsec.com/from-arbitrary-file-write-to-rce-in-restricted-rails-apps/</link>
					<comments>https://blog.convisoappsec.com/from-arbitrary-file-write-to-rce-in-restricted-rails-apps/#respond</comments>
		
		<dc:creator><![CDATA[Research Team Conviso]]></dc:creator>
		<pubDate>Mon, 23 Dec 2024 19:49:07 +0000</pubDate>
				<category><![CDATA[Code Fighters]]></category>
		<guid isPermaLink="false">https://blog.convisoappsec.com/?p=8985</guid>

					<description><![CDATA[<p>Introduction Recently, we came across a situation where we needed to exploit an arbitrary file write vulnerability in a Rails application running in a restricted environment. The application was deployed via a Dockerfile that imposed...</p>
<p>O post <a href="https://blog.convisoappsec.com/from-arbitrary-file-write-to-rce-in-restricted-rails-apps/">From Arbitrary File Write to RCE in Restricted Rails apps</a> apareceu primeiro em <a href="https://blog.convisoappsec.com">Conviso AppSec</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.convisoappsec.com/from-arbitrary-file-write-to-rce-in-restricted-rails-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8985</post-id>	</item>
	</channel>
</rss>