About the Blog category
|
|
0
|
116
|
16 January 2024
|
Five Prompt Injection Tactics to Hack LLM Apps
|
|
0
|
54
|
13 April 2024
|
Eight Defensive Techniques to Secure LLM Apps Against Prompt Injection
|
|
0
|
185
|
13 April 2024
|
UUID Weakness - Why UUID Can Be Unsafe
|
|
0
|
238
|
2 December 2023
|
Input Validation: Necessary but Not Sufficient; It Doesn't Target the Fundamental Issue
|
|
2
|
4720
|
28 September 2023
|
Evaluating ChatGPT’s Effectiveness in Passing A Secure Programming Challenge
|
|
0
|
660
|
25 May 2023
|
Write up for Start Here.js: How To and Not To Prevent Integer Overflow in JavaScript
|
|
0
|
4613
|
1 December 2022
|
Write up for Start Here.java Challenge
|
|
0
|
567
|
15 November 2022
|
Technical analysis of Optus API security challenge - Three must to have API security controls
|
|
0
|
18672
|
3 November 2022
|
Avoid validation with privilege return
|
|
0
|
828
|
26 September 2022
|
A dangerous way to fix Integer Overflow in Solidity
|
|
0
|
1853
|
5 September 2022
|
🔴 Instructor-Led AppSec & DevSecOps Workshops Recordings
|
|
0
|
1108
|
7 June 2022
|
Kubernetes pod is insecure by default
|
|
0
|
445
|
10 May 2022
|
Running a process as root in a container vs running a container as root
|
|
0
|
437
|
31 March 2022
|
Intro to Smart Contract Security and reverse engineering of int overflow
|
|
0
|
475
|
26 February 2022
|
A $10,000 security bug: Identify, exploit and effectively fix SSTI
|
|
0
|
546
|
28 January 2022
|
Parser Differential: A security vulnerability that we are going to live with
|
|
0
|
350
|
19 January 2022
|
What you see is not what interpreter sees!
|
|
0
|
335
|
6 December 2021
|
Two Overlooked Unicode vulnerabilities - Secure Programming Live Workshop
|
|
0
|
570
|
3 December 2021
|
Dangerous casting of Number type in JavaScript/TypeScript
|
|
0
|
527
|
17 November 2021
|
Go 1.18 comes with two exciting security features
|
|
0
|
503
|
4 November 2021
|
Not normalising before validation bypasses security checks
|
|
0
|
622
|
20 October 2021
|