Published inPenetration Testing and Different VulnerabilitiesUncovering Hidden Privileges: The Danger of Shadow Admins in Cloud EnvironmentsJun 9A response icon1Jun 9A response icon1
Published inPenetration Testing and Different VulnerabilitiesPentesting AI-Powered Applications: Risks Beyond the UIJun 6Jun 6
Published inPenetration Testing and Different VulnerabilitiesMalicious QR Codes: The Overlooked Threat in a Touch-less WorldIn a world increasingly driven by touch less interactions, QR codes have become a staple — from restaurant menus and event check-ins to…Jun 6Jun 6
Published inDevSecOps & AINeuromorphic Mimicry Attacks: The Next Frontier in Cybersecurity ThreatsIn the ever-evolving landscape of cybersecurity, a new and insidious threat has emerged —Neuromorphic Mimicry Attacks (NMAs). As we push…Jun 5Jun 5
Published inPenetration Testing and Different VulnerabilitiesPrompt Injection in Internal LLMsAs enterprises rapidly adopt Large Language Models (LLMs) to automate internal workflows, a subtle but serious threat is emerging: prompt…Jun 3Jun 3
Published inDevSecOps & AIINTRODUCTION TO LLM APPLICATIONS AND ITS OWASP Top 10What is LLM applicationsMay 28May 28
Published inDevSecOps Using Different Tools IntegrationsDevSecOps with GitGuardian in GitLab CI/CDGitGuardian helps you to catch sensitive data like API keys, passwords, and tokens before they get deployed.May 14May 14
Published inDevSecOps & AIIntroduction to OWASP Top 10 CI/CD Security RisksIn the race to ship faster and deploy more frequently, CI/CD (Continuous Integration and Continuous Deployment) pipelines have become the…May 12May 12