Blueinfy's blog

Pages

  • Home
  • Authored Books
  • Presentations
  • Papers/Articles
  • lambdaScanner
  • AI/ML Security
  • Case Studies

Secure SDLC and Static Code Analytics ...

Secure SDLC for Software
View more presentations from shreeraj.

Defending Against Top Web Attacks of 2010

Web Attacks - Top threats - 2010
View more presentations from shreeraj.
Newer Posts Older Posts Home
View mobile version
Subscribe to: Posts (Atom)

About us

Blueinfy specializes in application security with a clear strategic focus. We provide products and services to evaluate and improve the overall security posture of enterprise applications, websites and software deployed worldwide. We continually strive to ensure complete security of our clients' applications and software assets, and to achieve this through state-of-the-art know-how built by enhancing methodologies, evolving tools and researching technologies. [Explore us]

Knowledge based and Tools

This blog is created to share our knowledge base with the industry.



Blog Archive

  • ►  2024 (19)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ▼  2010 (5)
    • ►  September (2)
    • ▼  April (2)
      • Secure SDLC and Static Code Analytics ...
      • Defending Against Top Web Attacks of 2010
    • ►  February (1)
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2008 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

HTML5 serverless [Case Study] AI/ML Penetration testing lambda SAST aws CORS CSRF DAST DOM based XSS Security Controls Advanced Architecture Ajax JSON XHR Cloud DOM injection SSRF Validations XSS code review prompt injection Attack Surface Authentication Cookie replay File System API LLM Applications Methodology Upload WebSQL WebSocket mobile API Advisory Amish Shah Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage salesforce

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.