Blueinfy's blog

Pages

  • Home
  • Authored Books
  • Presentations
  • Papers/Articles
  • lambdaScanner
  • AI/ML Security
  • Case Studies

Future Trainings and Talks ...

InfoSecWorld 10 - Orlando
Web 2.0 Hacking: Attacks and Defense HANDS-ON
InfoSecWorld 10 - Orlando
Defending Against the Worst Web-Based Application Vulnerabilities of 2010

Secure SDLC for Software Assurance
HackInTheBox - Dubai
Web Application Security – Threats & Countermeasures
Newer Post Older Post Home
View mobile version

About us

Blueinfy specializes in application security with a clear strategic focus. We provide products and services to evaluate and improve the overall security posture of enterprise applications, websites and software deployed worldwide. We continually strive to ensure complete security of our clients' applications and software assets, and to achieve this through state-of-the-art know-how built by enhancing methodologies, evolving tools and researching technologies. [Explore us]

Knowledge based and Tools

This blog is created to share our knowledge base with the industry.



Blog Archive

  • ►  2024 (19)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ▼  2010 (5)
    • ►  September (2)
    • ►  April (2)
    • ▼  February (1)
      • Future Trainings and Talks ...
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2008 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

HTML5 serverless [Case Study] AI/ML Penetration testing lambda SAST aws CORS CSRF DAST DOM based XSS Security Controls Advanced Architecture Ajax JSON XHR Cloud DOM injection SSRF Validations XSS code review prompt injection Attack Surface Authentication Cookie replay File System API LLM Applications Methodology Upload WebSQL WebSocket mobile API Advisory Amish Shah Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage salesforce

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.