Mar 30 · 5 min read · If you're using Claude Code — and given that it reportedly has over 15 million commits on GitHub, a lot of you are — you need to stop and audit your project configuration files right now. Check Point Research published findings on two critical vulner...
Join discussion
Mar 19 · 9 min read · In early 2025, CISA added CVE-2025-3248 to their Known Exploited Vulnerabilities catalog. It was an unauthenticated remote code execution bug in Langflow, the popular open-source AI workflow builder w
Join discussionJan 19 · 7 min read · During an engagement, I identified a Local File Inclusion (LFI) vulnerability in a document transfer application written in plain PHP. Although the application enforced strict file upload controls—restricting uploads to .doc, .docx, and .pdf files an...
Join discussionJan 19 · 4 min read · College is not merely a phase of academic learning; it is a transformative chapter where identities are shaped, perspectives are built, and foundations for life are laid. For Nooruddin Mohammad, his college journey was not defined by a single achieve...
Join discussion
Jan 13 · 4 min read · Some stories don’t begin with achievements.They begin with a word. When I got his number from my sir, who also happens to be his father. I saved it like any other contact. Out of curiosity, I opened WhatsApp and checked his bio. There was just one wo...
RRaymond commented