Quantum Computing: The End of Encryption or the Start of a New Era?The rise of quantum computing is double edged sword . For decades, encryption has been the cornerstone of digital security, keeping our…2h ago2h ago
Securing AI Episode 5: LLM uncoveredIn my previous discussions on LLM security, I explored various types of attacks, including the OWASP Top 10 for LLMs, red teaming attacks…2d ago2d ago
Securing AI Episode 4: LLM uncoveredIn our last episode, we explored direct search, token manipulation, and gradient-based attacks. Today, we shift our focus to uncovering…6d ago6d ago
Demystifying Dynamic SSL pinning: For Secure mobile CommunicationRevolutionize App’s Security with Dynamic pinningJan 9Jan 9
Securing AI Episode 3: LLM uncoveredResuming our journey through LLM security, let’s pick up from where we last left off and delve deeper into critical subjects.Jan 6Jan 6
Securing AI Episode2:LLM uncoveredPicking up where we left off in our journey through LLM security, we explored the critical topic in our previous discussions.Jan 3Jan 3
Securing AI Episode1:LLM uncoveredAI is changing the way we work, and tools like GPT and BERT are leading the way. Imagine asking a chatbot a simple question, only to have…Dec 30, 2024Dec 30, 2024
The Unseen Battle: AI SecurityAI is transforming our world ,weaving itself into every aspects of daily lifeDec 7, 2024Dec 7, 2024
Securing GraphQL APIs: Challenges, Examples, and Best PracticesGraphQL has revolutionized API development with its flexibility and efficiency. However, this power introduces unique security challenges…Dec 6, 2024Dec 6, 2024
Behind the query: GraphQL Essentials and security PracticesIntroduction to Graphql:Dec 5, 2024Dec 5, 2024