Before starting, there is one thing to clarify. This article is not about “How to use the benefits of AI language models while conducting penetration test”. This article is about “How to conduct a penetration test towards AI language models”. With that said, please do not forget business logic vulnerabilities. For example, if an AI […]
You need to know if your company’s security controls and defenses can withstand a real cyber attack. Penetration testing is how you find out, but with three main types, black-box, grey-box, and white-box, how do you choose? Don’t worry, we’ve got you covered. Penetration tests can sound intimidating, but it’s one of the best ways […]
Introduction According to this paper, %65 of web applications suffer from cross-site scripting vulnerabilities. I am going to explain the Stored Cross-Site Scripting (XSS) vulnerability I found in an open-source project in this article. The main causes of stored cross-site scripting (stored XSS) vulnerabilities in web applications are neglect to implement security measures at the […]
Recruiting good hackers who can test your startup’s technologies for hidden vulnerabilities is essential to ensure your startup has a solid security posture because implementing multiple security measures is not enough. These “good hackers” who are also known as ethical hackers emulate a malicious actor’s adversarial behaviors and search for weaknesses or vulnerabilities in your […]