Ajay MongaLLM01: Prompt Injection Explained With Practical Example: Protecting Your LLM from Malicious InputPrompt Injection in AI: Common Attack Scenarios and How to Mitigate ThemAug 24Aug 24
Ajay MongaComparison of the First OWASP Top 10 and OWASP Top 10 2021Comparing the OWASP Top 10 Lists from 2003 to 2021: What’s New in 2021 vs. 2003?Aug 10Aug 10
Ajay MongainT3CHCrowdStrike Outage: Not a Cyberattack, but a Cyber Incident!CrowdStrike: The Cybersecurity Firm That Broke the InternetJul 25Jul 25
Ajay MongaHow the OWASP Top 10 Vulnerabilities List Developed?Decoding the OWASP Top 10: How the List of Critical Web Vulnerabilities is CreatedJul 20Jul 20
Ajay MongaInside SAST Tools: How They Work and Why You Need ThemThe Inner Workings of SAST Tools: An In-Depth Exploration and How Static Application Security Testing WorksJul 11Jul 11
Ajay MongaUnderstanding Information Disclosure Vulnerability: Types, Causes, and Mitigation Strategies And…Information Disclosure Vulnerability Example in Java. A Practical Guide to Protecting Sensitive InformationJun 27Jun 27
Ajay MongaMapping the AI Mind: New Research Reveals How Language Models Organize ConceptsFrom Black Box to Building Blocks: Unraveling the Inner Workings of AI ThoughtMay 26May 26
Ajay MongaThe AI Black Box: Why Cybersecurity Professionals Should CareThe AI Black Box Problem for Cybersecurity: Unmasking Security Risks and Ethical ConcernsMay 19May 19
Ajay MongainSystem WeaknessTop 5 SAST Vulnerabilities and How to Fix ThemSAST Security Alert: The 5 Most Common Code VulnerabilitiesMay 18May 18
Ajay MongaHow to Use Parameterized Queries in Ruby: Prevent SQL Injection with Parameterized QueriesSQL Injection Prevention for Ruby Developers: Parameterized Queries ExplainedMay 12May 12