Humans Need Entropy | Daniel Miessler
I’ve had several thoughts on the Karpathy and Dwarkesh conversation that took place in late October 2025. But the one that keeps haunting me is…
I’ve had several thoughts on the Karpathy and Dwarkesh conversation that took place in late October 2025. But the one that keeps haunting me is…
TLDR: Excessive Data Exposure (leaking internal data via API responses) is the silent, pervasive threat that is more dangerous than single dramatic flaws like SQL…
We couldn’t let Cybersecurity Awareness Month slip by without posting a bit of a fun blog on the topic, with a Halloween twist! Launched by…
CAB This week Semgrep had our Customer Advisory Board (CAB), where I got to hang out with and learn from a bunch of security leaders…
Our API scanner can test for dozens of vulnerability types like prompt injections and misconfigurations. We’re excited to share today that we’re releasing vulnerability tests…
Antwerp, Belgium, Oct. 23, 2025. Intigriti, a global crowdsourced security provider, is delighted to announce its latest partnership with non-profit Shield vzw within the framework agreement with…
Amelia Coen | 22 October 2025 at 13:15 UTC In her latest video, CyberMaddy dives into the world of AI-driven ethical hacking, exploring how Burp…
Amelia Coen | 22 October 2025 at 12:59 UTC What happens when you set Burp AI loose on a deliberately vulnerable web app? In his…
What can we learn from the recent AWS outage, and how can we apply those lessons to our own infrastructure? What Happened? On October 20,…
API security has never been more important because modern APIs are operational necessities. Unfortunately, many organizations are failing to adapt their security models to a…
When exploiting AI applications, I find myself using this technique really often so I figured I’d write a quick blog about it. I call it…
Cross-site scripting vulnerabilities are, by no doubt, one of the vulnerability types that’ll keep haunting applications for a long time. This seamless injection bug can…