Tags Tags AI About Amazon Authentication Bug Bounty CTF CVSS Cloud Security Collaboration Compliance as Code Contact Cyber Security DC9111 DEF CON Dependabot Dependencies DevOps DevSecOps Engineering FTP HTB Powershell Regular Expressions SSDLC Security Champions Security Engineering Security Training Security as Code Security at Scale Software Engineering Threat Modelling Vulnerability Management Vulnhub Web Security WinjaCTF2021 AI Why Running AI Coding Tools in Pipelines is a Security Risk September 24, 2025 About About October 10, 2025 Amazon How Amazon.com Protects Your Data: A Deep Look at Their Security July 12, 2025 Authentication How to find the Authentication Vulnerabilities? January 10, 2023 Bug Bounty How to find the Authentication Vulnerabilities? January 10, 2023 CTF Lovely Soup - DEF CON Delhi Group | DC9111 CTF 2022 July 31, 2022 OSINTEGO - DEF CON Delhi Group | DC9111 CTF 2021 October 02, 2021 Regular Expressions - Quiz 1 #WinjaCTF2021 February 27, 2021 ACID: SERVER (Vulnhub CTF Walkthrough) February 25, 2021 CVSS Why High CVSS Scores Don't Always Mean Real Danger June 04, 2025 Cloud Security Understanding Backend Components: When to Use What and Where July 03, 2025 Collaboration Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Compliance as Code Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Contact Contact Me October 10, 2025 Cyber Security Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Security as Code: Treating Security Like Any Other Code July 25, 2025 How Amazon.com Protects Your Data: A Deep Look at Their Security July 12, 2025 Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Paved Roads in Cybersecurity: Making Security the Easy Path June 12, 2025 Why High CVSS Scores Don't Always Mean Real Danger June 04, 2025 Guardrails vs Gates in Cybersecurity: What Every Developer Needs to Know May 29, 2025 How to Write Vulnerable Code: A Master Class in What NOT to Do May 24, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 DC9111 Lovely Soup - DEF CON Delhi Group | DC9111 CTF 2022 July 31, 2022 OSINTEGO - DEF CON Delhi Group | DC9111 CTF 2021 October 02, 2021 DEF CON Lovely Soup - DEF CON Delhi Group | DC9111 CTF 2022 July 31, 2022 OSINTEGO - DEF CON Delhi Group | DC9111 CTF 2021 October 02, 2021 Dependabot Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Dependencies Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 DevOps Understanding Backend Components: When to Use What and Where July 03, 2025 DevSecOps Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 Why Running AI Coding Tools in Pipelines is a Security Risk September 24, 2025 Did Your Threat Model Actually Work? September 17, 2025 Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Security as Code: Treating Security Like Any Other Code July 25, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 Engineering Understanding Backend Components: When to Use What and Where July 03, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 FTP Netmon (Metasploit + Manual Exploitation) February 23, 2021 HTB Netmon (Metasploit + Manual Exploitation) February 23, 2021 Powershell Netmon (Metasploit + Manual Exploitation) February 23, 2021 Regular Expressions Regular Expressions - Quiz 1 #WinjaCTF2021 February 27, 2021 SSDLC Paved Roads in Cybersecurity: Making Security the Easy Path June 12, 2025 Guardrails vs Gates in Cybersecurity: What Every Developer Needs to Know May 29, 2025 How to Write Vulnerable Code: A Master Class in What NOT to Do May 24, 2025 Security Champions Do We Still Need to Teach Developers Security? September 01, 2025 Security Engineering Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 Why Running AI Coding Tools in Pipelines is a Security Risk September 24, 2025 Did Your Threat Model Actually Work? September 17, 2025 Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Compliance as Code: How to Automate Regulatory Requirements August 02, 2025 Security as Code: Treating Security Like Any Other Code July 25, 2025 How Amazon.com Protects Your Data: A Deep Look at Their Security July 12, 2025 Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Paved Roads in Cybersecurity: Making Security the Easy Path June 12, 2025 Guardrails vs Gates in Cybersecurity: What Every Developer Needs to Know May 29, 2025 How to Write Vulnerable Code: A Master Class in What NOT to Do May 24, 2025 Breaking Down the Security Silo: How to Make Security Engineering Work May 20, 2025 Security Training Do We Still Need to Teach Developers Security? September 01, 2025 Security as Code Security as Code: Treating Security Like Any Other Code July 25, 2025 Security at Scale Why Every Developer Thinks Dependabot Sucks (And They're Right) August 23, 2025 How to Make Dependabot Actually Work for You August 10, 2025 Software Engineering Why Security Teams Are Making Developers Hate Them (And How to Fix It) June 20, 2025 Threat Modelling Did Your Threat Model Actually Work? September 17, 2025 Vulnerability Management Why High CVSS Scores Don't Always Mean Real Danger June 04, 2025 Vulnhub ACID: SERVER (Vulnhub CTF Walkthrough) February 25, 2021 Web Security Why Your Node.js App Has Golang Vulnerabilities (And What To Do About It) October 10, 2025 How to find the Authentication Vulnerabilities? January 10, 2023 WinjaCTF2021 Regular Expressions - Quiz 1 #WinjaCTF2021 February 27, 2021