Category: Mix

[tl;dr sec] #296 - AI Automates CVE -> Exploit, Apple Defeats Memory Corruption, Moar NPM Backdoors
11
Sep
2025

[tl;dr sec] #296 – AI Automates CVE -> Exploit, Apple Defeats Memory Corruption, Moar NPM Backdoors

AI auto-generating exploits from CVEs for $3, not actually but Memory Integrity Enforcement makes it harder, surprisingly NPM packages were…

11
Sep
2025

Instant Protection at the API Edge — API Security

APIs are now the beating heart of digital infrastructure. But as they have risen in importance, they’ve also become prime…

Our Constraints on Creativity | Daniel Miessler
10
Sep
2025

Our Constraints on Creativity | Daniel Miessler

The types of creative barriers that limit our potential There are multiple constraints that limit how creative we can be…

Product comparison: Detectify vs. Intruder
10
Sep
2025

Product comparison: Detectify vs. Intruder

Intruder is a cloud-based vulnerability scanner that provides an automated overview of an organization’s attack surface. Its primary function is…

How can I scope third-party assets?
10
Sep
2025

How can I scope third-party assets?

You asked, and we answered. At Intigriti, we’ve been paying close attention to the questions most frequently asked by those…

08
Sep
2025

Why Traditional Approaches Are Failing in the AI Era — API Security

Throughout the past few years, APIs have become the backbone of digital infrastructure. They enable software-to-software communication, improve integration and…

OWASP Seoul Meetup | HAHWUL
07
Sep
2025

OWASP Seoul Meetup | HAHWUL

2025.08.26 OWASP Seoul Meetup Recap At the recent OWASP Seoul Meetup, I had the opportunity to speak on the topic…

No, AI Is Not a Bubble
06
Sep
2025

No, AI Is Not a Bubble

There’s a popular argument going around that goes something like this: AI is a bubble Ok, maybe it’s useful and…

06
Sep
2025

No, AI Is Not a Bubble

There’s a popular argument going around that goes something like this: AI is a bubble It can be a bubble…

The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
04
Sep
2025

Watch the webinar: Scale secure coverage without scaling headcount | Blog

Application security teams are under pressure. With expanding application estates, growing API usage, and faster release cycles, many teams struggle…

[tl;dr sec] #295 - AI Code Analysis, AWS Detection Engineering, Anthropic Threat Intel Report
04
Sep
2025

[tl;dr sec] #295 – AI Code Analysis, AWS Detection Engineering, Anthropic Threat Intel Report

I hope you’ve been doing well! Gonna be Golden This past weekend I watched KPop Demon Hunters, and it was…

04
Sep
2025

Growth, Resilience, and What Comes Next — API Security

By Ivan Novikov and Stepan Ilyin When we started Wallarm, we focused on the APIs that power modern apps. We…