Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Category: IT Security Audit

When AI Understands Code: Prompt Injection to RCE

April 8, 2026 Alexandru Scânteie

This is part 1 of a multi-part series exploring the intersection of artificial intelligence and cybersecurity. As AI systems become increasingly powerful and deeply integrated

Continue reading

Our DefCamp 2022 talks are here!

February 1, 2023 Eduard Agavriloae

Both presentations we held this year at DefCamp are now available online (recordings and slides). DefCamp is one of the largest and most important cybersecurity

Continue reading

Penetration Testing in IT/ Security Assurance Projects

January 4, 2017 Mihai Gabriel Tanase

There are various cases when during an IT/ security assurance projects there are specific requirements to rely on penetration testing projects/ reports completed by a

Continue reading

Top Posts

  • Pentesting Azure: RECON Techniques
  • When AI Understands Code: Prompt Injection to RCE
  • Chained Vulnerabilities in Web Applications
  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • My experience with the OSCP certification

Blog Stats

  • 647,193 hits

Follow us via Email

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (14)
  • IT Security Assurance (1)
  • IT Security Audit (3)
  • Metasploit (1)
  • Misc (21)
    • Artificial Intelligence (2)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (30)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Powered by WordPress.com.
 

Loading Comments...