Security in the Real World — Beyond Just RecommendationsAs security researchers, we often recommend mitigations to improve system security. However, these suggestions can overlook the real…Feb 21Feb 21
Defending Against OTP Bots: The Future of MFA and Top Security Measures to Stay SafeIn my previous article, I explored the growing threat of OTP bots, detailing how they exploit weaknesses in traditional multi-factor…Feb 14Feb 14
MFA vs. OTP Bots: The Cat-and-Mouse Game of CybersecurityFor years, Multi-Factor Authentication (MFA) has been the go-to defense against hackers — but what if I told you it’s no longer foolproof…Feb 10Feb 10
Strengthening Kubernetes Security: Essential Best PracticesIn my previous article, I covered some of the best practices for securing Kubernetes clusters. Now, let’s dive deeper into additional…Feb 1Feb 1
Kubernetes under the Microscope:How secure is your clusterSetting up cluster in K8s is so challenging , that security becomes an after thought in K8s. Most of us think cloud environment is secure…Jan 27Jan 27
Never Trust always verify: Zero trust ModelNever Trust always verify , that phrase has made quite a buzz lately, I’m aware! What really stuck out to me in this conversation was the…Jan 24Jan 24
Quantum Computing: The End of Encryption or the Start of a New Era?The rise of quantum computing is double edged sword . For decades, encryption has been the cornerstone of digital security, keeping our…Jan 19Jan 19
Securing AI Episode 5: LLM uncoveredIn my previous discussions on LLM security, I explored various types of attacks, including the OWASP Top 10 for LLMs, red teaming attacks…Jan 16Jan 16
Securing AI Episode 4: LLM uncoveredIn our last episode, we explored direct search, token manipulation, and gradient-based attacks. Today, we shift our focus to uncovering…Jan 12Jan 12
Demystifying Dynamic SSL pinning: For Secure mobile CommunicationRevolutionize App’s Security with Dynamic pinningJan 9Jan 9