Mohit sharmaSecuring Spring Boot Actuator: Identification and Mitigation of VulnerabilitiesFeb 28Feb 28
Mohit sharmaSafeguarding Your Code: Understanding and Mitigating .git VulnerabilitiesIn the dynamic landscape of cybersecurity, protecting sensitive data and source code is paramount. However, one often overlooked…Feb 121Feb 121
Mohit sharmaProtecting Your S3 Bucket: Tips for Safely Granting Third-Party Vendor AccessDec 14, 2023Dec 14, 2023
Mohit sharmaUnraveling the OWASP Top 10 for Large Language ModelsIn recent years, large language models have revolutionized natural language processing tasks, enabling incredible advancements in various…Aug 3, 2023Aug 3, 2023
Mohit sharmaSecGPT — Revolutionizing Cybersecurity with AI-Driven Insights from Cybersecurity ReportsAn AI-driven cybersecurity tool called SecGPT offers insights regarding cybersecurity vulnerabilities, exploitation strategies, and new…Mar 20, 2023Mar 20, 2023
Mohit sharmaAndroid Application Security Testing Series Part — OneAndroid has become the most popular mobile operating system globally, with a market share of around 72%. With such widespread use, security…Mar 13, 2023Mar 13, 2023
Mohit sharmaExploring iOS Applications with Frida and Objection: Basic Commands for PentestingMobile application Pentesting is an essential part of securing any organization’s mobile assets. To perform thorough penetration testing, a…Mar 1, 20231Mar 1, 20231
Mohit sharmaGetting Started with Frida: Setting up on an EmulatorA well-liked dynamic instrumentation tool called Frida can be used to carry out a variety of security testing tasks. It enables programmers…Feb 25, 20231Feb 25, 20231
Mohit sharmaRansomware: Don’t be a victim, Learn How to Protect Your Business and YourselfRansomware is a type of malware that encrypts a victim’s files, making them inaccessible, and demands a ransom payment in exchange for the…Jan 24, 2023Jan 24, 2023
Mohit sharmaJWT Security 101: How to defend against common attacks on JSON Web TokensJSON Web Tokens (JWT) are a popular way to represent claims securely between two parties. They are often used for authentication and…Jan 11, 2023Jan 11, 2023