Blueinfy's blog

Pages

  • Home
  • Case Studies
  • AI/ML Security
  • AI/ML Tools
  • Salesforce
  • Authored Books
  • Presentations
  • lambdaScanner

Secure SDLC and Static Code Analytics ...

Secure SDLC for Software
View more presentations from shreeraj.

Defending Against Top Web Attacks of 2010

Web Attacks - Top threats - 2010
View more presentations from shreeraj.
Newer Posts Older Posts Home
View mobile version
Subscribe to: Comments (Atom)

About us

Blueinfy secures applications with human intelligence, pioneering research, and certified expertise, delivering precise, actionable, and context-driven results. Our proprietary technologies enable fast, efficient, and scalable security solutions, trusted by Fortune 100 companies and global enterprises alike. We build long-term partnerships through collaboration, accountability, and a relentless focus on protecting client digital assets. [Explore us]

Blog Archive

  • ►  2026 (18)
    • ►  April (2)
    • ►  March (4)
    • ►  February (7)
    • ►  January (5)
  • ►  2025 (8)
    • ►  December (3)
    • ►  September (1)
    • ►  July (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2024 (23)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ▼  2010 (5)
    • ►  September (2)
    • ▼  April (2)
      • Secure SDLC and Static Code Analytics ...
      • Defending Against Top Web Attacks of 2010
    • ►  February (1)
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2008 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

AI/ML Penetration testing HTML5 serverless [Case Study] lambda SAST aws CORS CSRF DAST DOM based XSS Security Controls salesforce Advanced Architecture Ajax JSON XHR AI Vulnerability Cloud DOM injection MCP SSRF Validations XSS code review mobile prompt injection Advisory Attack Surface Authentication Cookie replay File System API LLM Applications Methodology Upload WebSQL WebSocket API Agentic Amish Shah Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking OWASP Top 10 REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage tools

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.