Blueinfy's blog

Pages

  • Home
  • Case Studies
  • AI/ML Security
  • AI/ML Tools
  • Salesforce
  • Authored Books
  • Presentations
  • lambdaScanner

DeepSec 2008 - Training & Research

[11th November] DEEPSEC security confernce - Vienna, Austria


Training on Enterprise Secure Application Coding

Presentation on Web 2.0 Security Game
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

About us

Blueinfy secures applications with human intelligence, pioneering research, and certified expertise, delivering precise, actionable, and context-driven results. Our proprietary technologies enable fast, efficient, and scalable security solutions, trusted by Fortune 100 companies and global enterprises alike. We build long-term partnerships through collaboration, accountability, and a relentless focus on protecting client digital assets. [Explore us]

Blog Archive

  • ►  2026 (19)
    • ►  April (3)
    • ►  March (4)
    • ►  February (7)
    • ►  January (5)
  • ►  2025 (8)
    • ►  December (3)
    • ►  September (1)
    • ►  July (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2024 (23)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ►  2010 (5)
    • ►  September (2)
    • ►  April (2)
    • ►  February (1)
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ▼  2008 (13)
    • ▼  November (1)
      • DeepSec 2008 - Training & Research
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

HTML5 AI/ML [Case Study] serverless LLM Penetration Testing AI Agent & Protocol Security Automated Scanning Penetration testing lambda CORS CSRF aws code review DAST DOM based XSS SAST Security Controls salesforce AI Red Teaming AI Security Program Advanced Architecture Ajax JSON XHR Advisory DOM injection Marketplace/App Directory SSRF Validations XSS prompt injection AI Threat Simulation Agent Security Review AppSec Program Management Attack Surface Authentication Cloud Cookie replay DAST/SAST Evaluation File System API LLM Applications Methodology Upload WebSQL WebSocket mobile AI Vulnerability API AppSec Profiling Audit Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking OWASP Top 10 REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.