PinnedIntroduction to Security Architecture ReviewThis blog is about introduction to “Security Architecture Review”. In short why it is used, in which phase it is used, and what are…Feb 6, 2022Feb 6, 2022
AI in the Driver’s Seat: Securing Machine Learning Models in Autonomous VehiclesAs modern vehicles evolve into smart, self-driving machines, cybersecurity is no longer just about securing CAN buses or preventing remote…Jun 30Jun 30
Published inPenetration Testing and Different VulnerabilitiesUncovering Hidden Privileges: The Danger of Shadow Admins in Cloud EnvironmentsJun 9A response icon1Jun 9A response icon1
Published inPenetration Testing and Different VulnerabilitiesPentesting AI-Powered Applications: Risks Beyond the UIJun 6Jun 6
Published inPenetration Testing and Different VulnerabilitiesMalicious QR Codes: The Overlooked Threat in a Touch-less WorldIn a world increasingly driven by touch less interactions, QR codes have become a staple — from restaurant menus and event check-ins to…Jun 6Jun 6
Published inDevSecOps & AINeuromorphic Mimicry Attacks: The Next Frontier in Cybersecurity ThreatsIn the ever-evolving landscape of cybersecurity, a new and insidious threat has emerged —Neuromorphic Mimicry Attacks (NMAs). As we push…Jun 5Jun 5
Published inPenetration Testing and Different VulnerabilitiesPrompt Injection in Internal LLMsAs enterprises rapidly adopt Large Language Models (LLMs) to automate internal workflows, a subtle but serious threat is emerging: prompt…Jun 3Jun 3
Published inDevSecOps & AIINTRODUCTION TO LLM APPLICATIONS AND ITS OWASP Top 10What is LLM applicationsMay 28May 28
Published inDevSecOps Using Different Tools IntegrationsDevSecOps with GitGuardian in GitLab CI/CDGitGuardian helps you to catch sensitive data like API keys, passwords, and tokens before they get deployed.May 14May 14