Category: Mix

08
Sep
2025

Why Traditional Approaches Are Failing in the AI Era — API Security

Throughout the past few years, APIs have become the backbone of digital infrastructure. They enable software-to-software communication, improve integration and…

OWASP Seoul Meetup | HAHWUL
07
Sep
2025

OWASP Seoul Meetup | HAHWUL

2025.08.26 OWASP Seoul Meetup Recap At the recent OWASP Seoul Meetup, I had the opportunity to speak on the topic…

No, AI Is Not a Bubble
06
Sep
2025

No, AI Is Not a Bubble

There’s a popular argument going around that goes something like this: AI is a bubble Ok, maybe it’s useful and…

06
Sep
2025

No, AI Is Not a Bubble

There’s a popular argument going around that goes something like this: AI is a bubble It can be a bubble…

The Desync Delusion: Are You Really Protected Against HTTP Request Smuggling?
04
Sep
2025

Watch the webinar: Scale secure coverage without scaling headcount | Blog

Application security teams are under pressure. With expanding application estates, growing API usage, and faster release cycles, many teams struggle…

[tl;dr sec] #295 - AI Code Analysis, AWS Detection Engineering, Anthropic Threat Intel Report
04
Sep
2025

[tl;dr sec] #295 – AI Code Analysis, AWS Detection Engineering, Anthropic Threat Intel Report

I hope you’ve been doing well! Gonna be Golden This past weekend I watched KPop Demon Hunters, and it was…

04
Sep
2025

Growth, Resilience, and What Comes Next — API Security

By Ivan Novikov and Stepan Ilyin When we started Wallarm, we focused on the APIs that power modern apps. We…

How to do Bane's Voice
03
Sep
2025

How to do Bane’s Voice

Bane during the famous underground fight scene (click for full size) Not my normal type of content, obviously, but there’s…

How to attract security researchers to test on your bug bounty program
03
Sep
2025

How to attract security researchers to test on your bug bounty program

You asked, and we answered. At Intigriti, we’ve been paying close attention to the questions most frequently asked by those…

Exploiting SSRFs in Next.js Middleware
02
Sep
2025

Exploiting SSRFs in Next.js Middleware

At Intigriti, we hold monthly web-based Capture The Flag (CTF) challenges as a way to engage with the security research…

Pentesting Plugin Ecosystems: Advanced Exploitation Guide
02
Sep
2025

Pentesting Plugin Ecosystems: Advanced Exploitation Guide

Add-on (or plugin) ecosystems unlock an entire new world of integration possibilities while also complementing the platform’s extensibility to developers….

Introducing Dynamic API Scanning - Blog Detectify
02
Sep
2025

Introducing Dynamic API Scanning – Blog Detectify

Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a…