ELEMENTSBlog Layouts
AllSecurityUncategorized
January 30, 2025
DeepSeek: Data Breach Technical Walkthrough
In a recent security incident, DeepSeek, the new Chinese AI startup, suffered a significant data breach due to an unsecured ClickHouse database. This breach exposed over a million log entries, including sensitive information such as chat logs, API keys, backend service details, and operational metadata. Technical Walkthrough: Cause of the Breach The root cause of...
December 14, 2024
Understanding OAuth: Exploits, and Best Practices
OAuth (Open Authorization) is a widely adopted authorization framework that allows applications to grant limited access to their resources without exposing user credentials. OAuth allows users to authenticate third-party applications without sharing passwords, instead using tokens to authorize access to protected resources. While OAuth is a powerful and flexible authorization protocol, improper implementation can lead...
December 1, 2024
SAML: Fundamentals, Use Cases, Exploits, and Best Practices
Security Assertion Markup Language (SAML) is an XML-based framework for transmitting authentication and authorization data between an identity provider (IdP) and a service provider (SP). It’s widely used in Single Sign-On (SSO) implementations, allowing users to authenticate once and access multiple applications without repeatedly entering credentials. In this blog, we’ll explore the fundamentals of SAML,...