Tags Tags AI AI Security AI Threats About Amazon Authentication Bug Bounty CTF CVSS Cloud Security Collaboration Compliance as Code Contact Cyber Security DC9111 DEF CON Dependabot Dependencies DevOps DevSecOps Engineering FTP HTB OWASP Top 10 Powershell Prompt Injection Regular Expressions SSDLC Secure AI Security Champions Security Engineering Security Training Security as Code Security at Scale Software Engineering Static Threats Supply Chain Security Threat Modelling Vulnerability Management Vulnhub Web Security WinjaCTF2021 AI How to Actually Defend Against AI Static Threats March 08, 2026 The AI Threats Nobody Talks About March 07, 2026 Why Running AI Coding Tools in Pipelines is a Security Risk September 24, 2025 AI Security How to Actually Defend Against AI Static Threats March 08, 2026 The AI Threats Nobody Talks About March 07, 2026 AI Threats How to Actually Defend Against AI Static Threats March 08, 2026 The AI Threats Nobody Talks About March 07, 2026 About About March 08, 2026 Amazon How Amazon.com Protects Your Data: A Deep Look at Their Security July 12, 2025 Authentication How to find the Authentication Vulnerabilities? January 10, 2023 Bug Bounty How to find the Authentication Vulnerabilities? January 10, 2023 CTF Lovely Soup - DEF CON Delhi Group | DC9111 CTF 2022 July 31, 2022 OSINTEGO - DEF CON Delhi Group | DC9111 CTF 2021 October 02, 2021 Regular Expressions - Quiz 1 #WinjaCTF2021 February 27, 2021 ACID: SERVER (Vulnhub CTF Walkthrough) February 25, 2021 CVSS Why High CVSS Scores Don't Always Mean Real Danger June 04, 2025 Cloud Security Understanding Backend Components: When to Use What and Where July 03, 2025 Collaboration Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Compliance as Code Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Contact Contact Me March 08, 2026 Cyber Security Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Security as Code: Treating Security Like Any Other Code July 25, 2025 How Amazon.com Protects Your Data: A Deep Look at Their Security July 12, 2025 Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Paved Roads in Cybersecurity: Making Security the Easy Path June 12, 2025 Why High CVSS Scores Don't Always Mean Real Danger June 04, 2025 Guardrails vs Gates in Cybersecurity: What Every Developer Needs to Know May 29, 2025 How to Write Vulnerable Code: A Master Class in What NOT to Do May 24, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 DC9111 Lovely Soup - DEF CON Delhi Group | DC9111 CTF 2022 July 31, 2022 OSINTEGO - DEF CON Delhi Group | DC9111 CTF 2021 October 02, 2021 DEF CON Lovely Soup - DEF CON Delhi Group | DC9111 CTF 2022 July 31, 2022 OSINTEGO - DEF CON Delhi Group | DC9111 CTF 2021 October 02, 2021 Dependabot Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Dependencies Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 DevOps Understanding Backend Components: When to Use What and Where July 03, 2025 DevSecOps The Rising Tide of Software Supply Chain Threats November 15, 2025 Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 Why Running AI Coding Tools in Pipelines is a Security Risk September 24, 2025 Did Your Threat Model Actually Work? September 17, 2025 Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Security as Code: Treating Security Like Any Other Code July 25, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 Engineering Understanding Backend Components: When to Use What and Where July 03, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 FTP Netmon (Metasploit + Manual Exploitation) February 23, 2021 HTB Netmon (Metasploit + Manual Exploitation) February 23, 2021 OWASP Top 10 The Rising Tide of Software Supply Chain Threats November 15, 2025 Powershell Netmon (Metasploit + Manual Exploitation) February 23, 2021 Prompt Injection The AI Threats Nobody Talks About March 07, 2026 Regular Expressions Regular Expressions - Quiz 1 #WinjaCTF2021 February 27, 2021 SSDLC Paved Roads in Cybersecurity: Making Security the Easy Path June 12, 2025 Guardrails vs Gates in Cybersecurity: What Every Developer Needs to Know May 29, 2025 How to Write Vulnerable Code: A Master Class in What NOT to Do May 24, 2025 Secure AI How to Actually Defend Against AI Static Threats March 08, 2026 Security Champions Do We Still Need to Teach Developers Security? September 01, 2025 Security Engineering How to Actually Defend Against AI Static Threats March 08, 2026 The AI Threats Nobody Talks About March 07, 2026 The Rising Tide of Software Supply Chain Threats November 15, 2025 Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 Why Running AI Coding Tools in Pipelines is a Security Risk September 24, 2025 Did Your Threat Model Actually Work? September 17, 2025 Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Security as Code: Treating Security Like Any Other Code July 25, 2025 How Amazon.com Protects Your Data: A Deep Look at Their Security July 12, 2025 Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Paved Roads in Cybersecurity: Making Security the Easy Path June 12, 2025 Guardrails vs Gates in Cybersecurity: What Every Developer Needs to Know May 29, 2025 How to Write Vulnerable Code: A Master Class in What NOT to Do May 24, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 Security Training Do We Still Need to Teach Developers Security? September 01, 2025 Security as Code Security as Code: Treating Security Like Any Other Code July 25, 2025 Security at Scale Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Software Engineering Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Static Threats How to Actually Defend Against AI Static Threats March 08, 2026 The AI Threats Nobody Talks About March 07, 2026 Supply Chain Security The Rising Tide of Software Supply Chain Threats November 15, 2025 Threat Modelling Did Your Threat Model Actually Work? September 17, 2025 Vulnerability Management Why High CVSS Scores Don't Always Mean Real Danger June 04, 2025 Vulnhub ACID: SERVER (Vulnhub CTF Walkthrough) February 25, 2021 Web Security Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 How to find the Authentication Vulnerabilities? January 10, 2023 WinjaCTF2021 Regular Expressions - Quiz 1 #WinjaCTF2021 February 27, 2021