Skip to main content

What's New at Security Journey 2025 🎉

All our recent updates - from new features, content & enhancements!

Rachel Yonan avatar
Written by Rachel Yonan
Updated over 2 weeks ago

April 4th, 2025

Test Connection Safelisting Tool

We are really excited to announce that we have developed a new page that can be used to test your organization's network connection. When a user or admin accesses this page, it will test all the required Security Journey domains and alert you if you need to work with your Network team to adjust your safelisting rules. If one of these domains is not accessible, our content may not work as expected.


Check it out here!


April 3rd, 2025

Learning Swing Modal Redesign

Our learning swing modal got a much needed face-lift!


April 2nd, 2025

New Content & Path Alert 🚨

Blockchain Security | Reentrancy

In our newly updated blockchain lesson, “Blockchain Security | Reentrancy”, we’ve added an interactive IDE that allows learners to fix vulnerabilities directly in the smart contract code. This hands-on approach strengthens our appeal to the DeFi sector—an area underserved by existing training platforms—and positions us to be a leader in blockchain security education.

You can access the lesson here: Blockchain Security | Reentrancy

Next.js Publicly Disclosed Vulnerability CVE-2025-29927

Our team created a CTF-style lesson to challenge learners to exploit CVE-2025-29927, a vulnerability discovered in Next.js middleware on March 21, 2025. This CVE allows attackers to bypass authorization checks in the middleware and access protected content. Learners can use either the intercept request feature or make a direct request using GetMan to access a protected page and capture the flag.

You can try the lesson here: CTF: Music Calendar Break-in

Secure Privilege Management

A customer requested training content focused on CWE-268: Privilege Chaining. In response, we delivered a focused set of four lessons that directly address this issue. These lessons will emphasize the core security principles necessary to understand and prevent privilege chaining vulnerabilities. Path details are as follows:

Insecure Design | Incorrect Privilege Assignment

  • This lesson explores Incorrect User Management, highlighting the security risks that arise when the principle of least privilege is not adequately enforced.

Challenge: Setuid Vulnerability Exploitation

  • In this challenge, you’ll examine a vulnerable setuid executable that runs with elevated privileges, exposing a critical security flaw. Your task is to analyze the program, identify the weakness, and exploit it to disable logins to the system.

Privilege Escalation: Container Escape

  • In this lesson, you’ll explore how misconfigured Docker environments can lead to privilege escalation attacks. By interacting with Docker containers, you’ll learn how attackers can exploit improper permissions to gain unauthorized root access.

Privilege Chaining in Databases

  • This hands-on lesson demonstrates how privilege chaining vulnerabilities can expose sensitive data in MySQL.

  • Learners will exploit a misconfigured SQL view to access restricted salary information, despite lacking direct permissions. Through guided remediation, they’ll learn how to properly secure views using SQL SECURITY INVOKER and avoid common access control pitfalls when working with database objects.

You can find the path here.


March 27th, 2025

Certificate Redesign 🎉

We released a new look and feel for our Security Journey Certificates! This will apply to any new and previously completed paths. You can download your new certificates from your Achievements in your User Profile.


March 26th, 2025

Coding Challenge Instruction Refresh & Quiz Question Refresh

Coding Challenge Instructions Refresh

Code Challenges, which give learners access to a full codebase, were originally designed to follow our break/fix lessons. As a result, some challenges assumed prior knowledge—such as login credentials—gained in earlier lessons, making it difficult to complete them as stand-alone activities or in a tournament setting.

Our team has now revisited each Code Challenge to update and improve the instructions, ensuring that learners have all the information they need to complete the tasks independently!

Quiz Question Refresh

Our Content team has gotten a lot of feedback around improving the quiz questions in some of our older video lessons. For context, many of these quizzes were originally created by a third-party vendor, and the quality has been inconsistent—often lacking subject matter expertise and clarity.

In response, we’ve committed to reviewing and improving the quiz content in 80 lessons, with a focus on quality and providing meaningful feedback to learners. Over the past two weeks, we’ve updated 43 of those lessons. See the current updated lessons below:

  • Introduction to Go security

  • Go Threat Landscape

  • Go and OWASP Top 10 | Part 1

  • Go and OWASP Top 10 | Part 2

  • Secure Coding in Go

  • Secure Database Interactions in Go

  • Go Request Context Security

  • Secrets Management with Go

  • Secure Concurrency with Go

  • Go Secure Micro-service Architecture

  • Go Service Hardening

  • Python Threat Landscape

  • Secure Constructs in Python

  • Input Validation with Python

  • Secure Coding with Python | Part 1

  • Secure Coding with Python | Part 2

  • Secure Coding with Python | Part 3

  • Secure OS interactions with Python

  • Secure Serialization with Python

  • Storing and Using Secrets with Python

  • Secure Control Flow in Python

  • Introduction to Scala Security

  • Scala Input Validation

  • Scala OWASP Top 10 | Part 1

  • Scala OWASP Top 10 | Part 2

  • Scala OWASP Top 10 | Part 3

  • Scala Software Supply Chain

  • Scala Security Best Practices

  • Introduction to Rust Security

  • Rust Secure Coding Tips

  • Unsafe Rust & FFI

  • Rust OWASP Top 10 Pt. 1

  • Rust OWASP Top 10 Pt. 2

  • Rust OWASP Top 10 Pt. 3

  • Rust Secure Software Supply Chain

  • Rust Security Toolchain

  • Typescript: Intro to Typescript Security

  • Typescript: Secure Coding with Typescript part 1

  • Typescript: Secure Coding with Typescript part 2

  • Typescript: Input Validation for Typescript

  • Typescript: Secure Constructs with Typescript Part 1

  • Typescript: Secure Constructs with Typescript Part 2

  • Typescript: Typescript Secure Build Toolchain


March 14th, 2025

Assessment Due Dates

We've already made improvements to our new Developer Security Knowledge Assessment experience by adding in the time limit or due date to the Map and List View.


March 12th, 2025

Developer Profile

Starting today. learners visiting the Security Journey Platform will be
asked to complete the Developer Profile, which captures key details like:

  • Their background and experience

  • Preferred programming languages

  • Job roles, architectural tools, and security knowledge

Capturing this information will allow you in the future to tailor training to
each developer’s expertise and deliver more relevant and impactful content. To learn more about our Developer Profile, check out this article!


February 18th, 2025

New Top 25 CWE Path

Top 25 CWEs

25 NEW Video Lessons covering the Top 25 CWEs has been released!

MITRE Corporation, a leader in cybersecurity, maintains the CWE Top 25, a list of the most critical software weaknesses across various application types. Unlike the OWASP Top 10, which focuses on web application security, the CWE Top 25 includes vulnerabilities found in native applications and other non-web environments.

Customers have frequently asked about our coverage of this topic and we now have a comprehensive set of lessons to help learners understand and mitigate these critical security flaws!

It's at our Foundational Level. You can find it under Paths & Quests > Recommended Paths > Video and Hands-On > CWE Top 25.


February 14th, 2025

Updated OWASP Top 10 for LLM Applications 2025 Paths & NEW Hacking Challenges

OWASP Top 10 for LLM Applications 2025

Our team has released a new course that covers LLM Security including lessons specific to the update OWASP Top 10 LLM Application list.

We've also added a new video component to these hands-on lessons to streamline the learning experience. Learners who need additional depth can now watch relevant videos without leaving the hands-on lesson, making it easier to absorb key concepts in context.

You can find these new paths here:

  • Paths & Quests > Recommended Paths > Hands-On Only > HackEDU: OWASP Top 10 for LLM Applications

  • Paths & Quests > Recommended Paths > Video and Hands-On > AI/LLM Security

For more details check out this article.

Three New Hacking Challenges

This week, we introduced three new Capture The Flag (CTF) challenges:


February 11th, 2025

Developer Security Knowledge Assessments 🎉

NEW FEATURE ALERT! Our Developer Security Knowledge Assessments are LIVE!

Assessments is a powerful tool designed to evaluate developers' understanding of secure coding and application security principles.

Our assessment helps organizations measure and improve their teams' security proficiency, ensuring they are equipped to build secure applications from the ground up.

To learn more, check out this collection of articles and find out how you can use them today!


January 31st, 2025

Assignment Reminder Frequency Update & Reporting Improvements

Ability to Send Daily Assignment Reminders

Now, you can send daily reminders to your learners by updating your Assignment notification settings. Assignments can be updated at any time. Once enabled, learners will receive a bell notification once a day until they complete their training. If they don't clear their bell notification within an hour of receiving it. They would get an "Unread Notification" email reminding them of their assigned training.

New Path Filters

We recently rolled out some new filters within our Progress Report and Assignment Progress reports to make reporting on learners' progress in paths even easier!

Within the Progress Report and Assignment Progress report you can filter on path enrollment or identify learners who have not yet enrolled in a path. This report will allow you to track who has not yet logged in and started training.


January 23rd, 2025

CWE Filter Vulnerability Details on Hover

We've made using CWE Filters even easier! You can now hover your cursor over the CWE number and see the name of the vulnerability will be displayed. This should make finding and assigning what you need even that easier!


January 16th, 2025

CWE Filter Displays Total Lesson Count

The CWE Filter in the Custom Path UI now displays the count of total lessons associated with each CWE number.

  • This mirrors the Full Catalog experience

  • Please note that the numbers in the Full Catalog can be higher than in the Custom Path Ul, as the Full Catalog displays Tournament-Only content (and the other Ul does not)


January 9th, 2025

Navigation Bar & User Profile Updates 🎉

We've made some big improvements to our Platform Navigation Bar & User Profile settings.

Notable changes include:

  • Log Out moved to the bottom of the User Profile dropdown

  • More Menu has been removed and features reorganized

To learn more, check out this article!

Did this answer your question?