Ajay MongaComparison of the First OWASP Top 10 and OWASP Top 10 2021Comparing the OWASP Top 10 Lists from 2003 to 2021: What’s New in 2021 vs. 2003?2d ago2d ago
Ajay MongainT3CHCrowdStrike Outage: Not a Cyberattack, but a Cyber Incident!CrowdStrike: The Cybersecurity Firm That Broke the InternetJul 25Jul 25
Ajay MongaHow the OWASP Top 10 Vulnerabilities List Developed?Decoding the OWASP Top 10: How the List of Critical Web Vulnerabilities is CreatedJul 20Jul 20
Ajay MongaInside SAST Tools: How They Work and Why You Need ThemThe Inner Workings of SAST Tools: An In-Depth Exploration and How Static Application Security Testing WorksJul 11Jul 11
Ajay MongaUnderstanding Information Disclosure Vulnerability: Types, Causes, and Mitigation Strategies And…Information Disclosure Vulnerability Example in Java. A Practical Guide to Protecting Sensitive InformationJun 27Jun 27
Ajay MongaMapping the AI Mind: New Research Reveals How Language Models Organize ConceptsFrom Black Box to Building Blocks: Unraveling the Inner Workings of AI ThoughtMay 26May 26
Ajay MongaThe AI Black Box: Why Cybersecurity Professionals Should CareThe AI Black Box Problem for Cybersecurity: Unmasking Security Risks and Ethical ConcernsMay 19May 19
Ajay MongainSystem WeaknessTop 5 SAST Vulnerabilities and How to Fix ThemSAST Security Alert: The 5 Most Common Code VulnerabilitiesMay 18May 18
Ajay MongaHow to Use Parameterized Queries in Ruby: Prevent SQL Injection with Parameterized QueriesSQL Injection Prevention for Ruby Developers: Parameterized Queries ExplainedMay 12May 12
Ajay MongaParameterized Queries JavaScript Guide: How to Prevent SQL Injection with Parameterized QueriesSQL Injection Prevention for JavaScript Developers: Parameterized Queries ExplainedMay 9May 9