Blueinfy's blog

Pages

  • Home
  • Case Studies
  • AI/ML Security
  • AI/ML Tools
  • Salesforce
  • Authored Books
  • Presentations
  • lambdaScanner

DeepSec 2008 - Training & Research

[11th November] DEEPSEC security confernce - Vienna, Austria


Training on Enterprise Secure Application Coding

Presentation on Web 2.0 Security Game
Newer Posts Older Posts Home
View mobile version
Subscribe to: Comments (Atom)

About us

Blueinfy secures applications with human intelligence, pioneering research, and certified expertise, delivering precise, actionable, and context-driven results. Our proprietary technologies enable fast, efficient, and scalable security solutions, trusted by Fortune 100 companies and global enterprises alike. We build long-term partnerships through collaboration, accountability, and a relentless focus on protecting client digital assets. [Explore us]

Blog Archive

  • ►  2026 (18)
    • ►  April (2)
    • ►  March (4)
    • ►  February (7)
    • ►  January (5)
  • ►  2025 (8)
    • ►  December (3)
    • ►  September (1)
    • ►  July (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2024 (23)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ►  2010 (5)
    • ►  September (2)
    • ►  April (2)
    • ►  February (1)
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ▼  2008 (13)
    • ▼  November (1)
      • DeepSec 2008 - Training & Research
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

AI/ML Penetration testing HTML5 serverless [Case Study] lambda SAST aws CORS CSRF DAST DOM based XSS Security Controls salesforce Advanced Architecture Ajax JSON XHR AI Vulnerability Cloud DOM injection MCP SSRF Validations XSS code review mobile prompt injection Advisory Attack Surface Authentication Cookie replay File System API LLM Applications Methodology Upload WebSQL WebSocket API Agentic Amish Shah Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking OWASP Top 10 REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage tools

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.