Blueinfy's blog

Pages

  • Home
  • Case Studies
  • AI/ML Security
  • AI/ML Tools
  • Salesforce
  • Authored Books
  • Presentations
  • lambdaScanner

Future Trainings and Talks ...

InfoSecWorld 10 - Orlando
Web 2.0 Hacking: Attacks and Defense HANDS-ON
InfoSecWorld 10 - Orlando
Defending Against the Worst Web-Based Application Vulnerabilities of 2010

Secure SDLC for Software Assurance
HackInTheBox - Dubai
Web Application Security – Threats & Countermeasures
Newer Post Older Post Home
View mobile version

About us

Blueinfy secures applications with human intelligence, pioneering research, and certified expertise, delivering precise, actionable, and context-driven results. Our proprietary technologies enable fast, efficient, and scalable security solutions, trusted by Fortune 100 companies and global enterprises alike. We build long-term partnerships through collaboration, accountability, and a relentless focus on protecting client digital assets. [Explore us]

Blog Archive

  • ►  2026 (18)
    • ►  April (2)
    • ►  March (4)
    • ►  February (7)
    • ►  January (5)
  • ►  2025 (8)
    • ►  December (3)
    • ►  September (1)
    • ►  July (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2024 (23)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ▼  2010 (5)
    • ►  September (2)
    • ►  April (2)
    • ▼  February (1)
      • Future Trainings and Talks ...
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2008 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

AI/ML Penetration testing HTML5 serverless [Case Study] lambda SAST aws CORS CSRF DAST DOM based XSS Security Controls salesforce Advanced Architecture Ajax JSON XHR AI Vulnerability Cloud DOM injection MCP SSRF Validations XSS code review mobile prompt injection Advisory Attack Surface Authentication Cookie replay File System API LLM Applications Methodology Upload WebSQL WebSocket API Agentic Amish Shah Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking OWASP Top 10 REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage tools

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.