Blueinfy's blog

Pages

  • Home
  • Case Studies
  • AI/ML Security
  • AI/ML Tools
  • Salesforce
  • Authored Books
  • Presentations
  • lambdaScanner

Future Trainings and Talks ...

InfoSecWorld 10 - Orlando
Web 2.0 Hacking: Attacks and Defense HANDS-ON
InfoSecWorld 10 - Orlando
Defending Against the Worst Web-Based Application Vulnerabilities of 2010

Secure SDLC for Software Assurance
HackInTheBox - Dubai
Web Application Security – Threats & Countermeasures
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

About us

Blueinfy secures applications with human intelligence, pioneering research, and certified expertise, delivering precise, actionable, and context-driven results. Our proprietary technologies enable fast, efficient, and scalable security solutions, trusted by Fortune 100 companies and global enterprises alike. We build long-term partnerships through collaboration, accountability, and a relentless focus on protecting client digital assets. [Explore us]

Blog Archive

  • ►  2026 (19)
    • ►  April (3)
    • ►  March (4)
    • ►  February (7)
    • ►  January (5)
  • ►  2025 (8)
    • ►  December (3)
    • ►  September (1)
    • ►  July (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2024 (23)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ▼  2010 (5)
    • ►  September (2)
    • ►  April (2)
    • ▼  February (1)
      • Future Trainings and Talks ...
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2008 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

HTML5 AI/ML [Case Study] serverless LLM Penetration Testing AI Agent & Protocol Security Automated Scanning Penetration testing lambda CORS CSRF aws code review DAST DOM based XSS SAST Security Controls salesforce AI Red Teaming AI Security Program Advanced Architecture Ajax JSON XHR Advisory DOM injection Marketplace/App Directory SSRF Validations XSS prompt injection AI Threat Simulation Agent Security Review AppSec Program Management Attack Surface Authentication Cloud Cookie replay DAST/SAST Evaluation File System API LLM Applications Methodology Upload WebSQL WebSocket mobile AI Vulnerability API AppSec Profiling Audit Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking OWASP Top 10 REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.