Published inInfoSec Write-upsExploring Jailbreak Attacks: Understanding LLM Vulnerabilities and the Challenges of Detection and…The recent rise in jailbreaking methods has revealed the vulnerability of Large Language Models (LLMs) to malicious inputs. Jailbreaking…Oct 8, 2024Oct 8, 2024
Published inInfoSec Write-upsUnmasking Prompt Injection: A Dive into an Overlooked AI Security ConcernTable of ContentsSep 13, 2024Sep 13, 2024
Published inInfoSec Write-upsSecuring Private APIs in API Gateway Using VPC EndpointsA VPC (Virtual Private Cloud) endpoint is a private connection between your VPC and another AWS (Amazon Web Services) service, such as S3…Jun 27, 20231Jun 27, 20231
Published inInfoSec Write-upsSeamless Cross-Account, Cross-Region Replication of Encrypted Objects in AWS S3: Simplified Data…In today’s digital landscape, data protection is paramount for organizations handling sensitive information. Amazon Simple Storage Service…Jun 5, 20231Jun 5, 20231
Published inInfoSec Write-upsEnhancing API Gateway Security: Integrating AWS Cognito User Pools with Authorization Code GrantAmazon Cognito is a fully managed service provided by Amazon Web Services (AWS) that simplifies the authentication, authorization, and user…May 27, 20231May 27, 20231
Published inInfoSec Write-upsThe Bind, Escalate and Impersonate Verbs For Privilege Escalation In The Kubernetes ClusterKubernetes role binding plays a critical role in controlling access to resources within a Kubernetes cluster, it grants the permissions…May 12, 2023May 12, 2023
Published inInfoSec Write-upsSingle Sign-On: OAUTH vs OIDC vs SAML — Part 2Welcome to Part 2 of our series on Single Sign-On (SSO) technologies. In the previous blog post, we went through SSO, OAuth, and OpenID…Mar 26, 2023Mar 26, 2023
Published inInfoSec Write-upsSingle Sign-On: OAuth vs OIDC vs SAML— Part 1User authentication is a critical component of online services and applications, enabling users to access secure resources while protecting…Mar 25, 20231Mar 25, 20231
Published inInfoSec Write-upsEnforce Zero Trust With East‑West Traffic Encryption in Kubernetes with Istio — Part 2In part 1, we have gone over concepts of East-West traffic encryption with Istio in Kubernetes. In this section, we will set up Istio…Feb 2, 2023Feb 2, 2023
Published inInfoSec Write-upsEnforce Zero Trust With East‑West Traffic Encryption in Kubernetes with Istio — Part 1A typical enterprise’s infrastructure has grown increasingly complex, especially when they move from traditional monolithic software…Jan 28, 2023Jan 28, 2023