Recent articles
-
GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories
Is your CI/CD pipeline safe from threats? A troubling incident has exposed significant vulnerabilities in GitHub Actions, specifically the tj-actions/changed-files…
-
Choosing the Best RAG Tool: LlamaIndex vs LangChain
In the fast-paced world of artificial intelligence, the choice of a Retrieval-Augmented Generation (RAG) tool can define your project’s success.…
-
Injection Attacks in Application Security: Types and Prevention
What if a simple line of code could lead to complete system compromise? Injection attacks pose a significant threat to…
-
Injection Attacks in Application Security: Types and Tools
How does your web application defend against one of the most common vulnerabilities known as injection attacks? These attacks capitalize…
-
Head Mare and Twelve Collaborate to Attack Russian Entities
In September 2024, coordinated cyberattacks targeted several Russian firms, marking a significant shift in operational tactics linked to two notorious…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher