<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Saurav Dawadi</title>
    <description>The latest articles on Forem by Saurav Dawadi (@saurav_dawadi).</description>
    <link>https://forem.com/saurav_dawadi</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3659913%2Fb338e7be-ce74-4dc4-a1a9-343c5c3b2fc6.png</url>
      <title>Forem: Saurav Dawadi</title>
      <link>https://forem.com/saurav_dawadi</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/saurav_dawadi"/>
    <language>en</language>
    <item>
      <title>Can Google Be Trusted With SEO Anymore? The Mac Malware Case Study</title>
      <dc:creator>Saurav Dawadi</dc:creator>
      <pubDate>Thu, 12 Feb 2026 10:58:00 +0000</pubDate>
      <link>https://forem.com/saurav_dawadi/can-google-be-trusted-with-seo-anymore-the-mac-malware-case-study-559f</link>
      <guid>https://forem.com/saurav_dawadi/can-google-be-trusted-with-seo-anymore-the-mac-malware-case-study-559f</guid>
      <description>&lt;p&gt;Google built its empire on one promise: connect people with the information they need. But what happens when that promise becomes a liability? When the world’s most trusted search engine consistently serves malware as its top result, we need to ask an uncomfortable question: Can Google be trusted with SEO?&lt;/p&gt;

&lt;p&gt;So lets start with an example here:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpmg9oni74oh0vg8314i5.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpmg9oni74oh0vg8314i5.gif" alt=" " width="560" height="350"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;From this you can see the top result that comes when you type in the following. We can clearly see that this is a variant of AMOS (Atomic macOS Stealer).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What can AMOS do ?&lt;/strong&gt;&lt;br&gt;
Well AMOS has the capability to exfiltrate:&lt;/p&gt;

&lt;p&gt;All saved passwords from browsers and Keychain&lt;br&gt;
Cryptocurrency wallet credentials&lt;br&gt;
Banking information&lt;br&gt;
Session cookies (giving attackers direct access to your accounts)&lt;br&gt;
Files from your Desktop and Documents folders&lt;br&gt;
Now , Why does this work so well ?&lt;/p&gt;

&lt;p&gt;Firstly , It’s on top of your google search. Must be the most legitimate one right ?&lt;/p&gt;

&lt;p&gt;Secondly ,have a look at the domain similar to that of medium. Another run showed an article on dev.to , where most of the software engineering talks happen. So can trick you thinking into it’s legitimacy&lt;/p&gt;

&lt;p&gt;Thirdly, the article appears as a helpful content.&lt;/p&gt;

&lt;p&gt;And finally a myth that has been followed by many, I have a Mac , it’s unlikely to be vulnerable to viruses like the other OS devices (Well this can haunt you)&lt;br&gt;
**&lt;br&gt;
What to be on the lookout for ?**&lt;/p&gt;

&lt;p&gt;So now in the world where sophisticated attacks are growing day by day , let’s be careful of few checks:&lt;/p&gt;

&lt;p&gt;Don’t depend on sponsored result for system related issues? The one that paid for gets to be there and the until a check is perfomed or the result has been labeled malicious , it might be too late.&lt;/p&gt;

&lt;p&gt;Secondly look at the domain properly, the domain name can be confusing&lt;/p&gt;

&lt;p&gt;Now , sometimes the title give away, does it show urgency ? If yes, likely to be an attempt of malware&lt;/p&gt;

&lt;p&gt;If somehow someone does fall into this trap, what to do ?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Disconnect from internet immediately&lt;/li&gt;
&lt;li&gt;Don’t enter any passwords or financial information&lt;/li&gt;
&lt;li&gt;Change all passwords from a different, clean device&lt;/li&gt;
&lt;li&gt;Enable 2FA on all critical accounts&lt;/li&gt;
&lt;li&gt;Monitor your accounts for unusual activity&lt;/li&gt;
&lt;li&gt;Consider professional help: Apple Support or a cybersecurity specialist
This attack represents a disturbing trend: malvertising (malicious advertising) is becoming more sophisticated and harder to detect. Google is playing whack-a-mole with these ads, but new ones appear daily. So it’s upto each one of us to be aware. The Time Google does act on this might be too little too late.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While many of us might see the technical side of it , I guess awareness regarding this is equally important&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What can be done before ?&lt;/strong&gt;&lt;br&gt;
Well we all know the saying of prevention is better than cure, lets start with some action item :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Skip sponsored results for technical queries&lt;/li&gt;
&lt;li&gt;Verify URLs carefully before clicking&lt;/li&gt;
&lt;li&gt;Use built-in tools whenever possible&lt;/li&gt;
&lt;li&gt;Keep macOS updated (security patches matter)&lt;/li&gt;
&lt;li&gt;Enable FileVault (full disk encryption)&lt;/li&gt;
&lt;li&gt;Practice healthy skepticism — if something feels off, it probably is&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>security</category>
      <category>seo</category>
    </item>
    <item>
      <title>How Quality Assurance Engineers Can Strengthen Application Security</title>
      <dc:creator>Saurav Dawadi</dc:creator>
      <pubDate>Sat, 13 Dec 2025 11:59:18 +0000</pubDate>
      <link>https://forem.com/saurav_dawadi/how-quality-assurance-engineers-can-strengthen-application-security-3ogd</link>
      <guid>https://forem.com/saurav_dawadi/how-quality-assurance-engineers-can-strengthen-application-security-3ogd</guid>
      <description>&lt;p&gt;When we talk about Quality Assurance, the traditional approach is straightforward: Does input A lead to output B? But when you put on the hat of a QA engineer, you become professionally paranoid. You don’t just want to verify that input A produces output B. You want to discover what happens when it doesn’t.&lt;/p&gt;

&lt;p&gt;Through my experience in both Quality Assurance and Security, I’ve observed something crucial: these two domains are far more intertwined than most realise. When you develop the mindset of breaking things, you’re already halfway to thinking like a security professional.&lt;/p&gt;

&lt;p&gt;A Real-World Scenario: The Promo Code Problem&lt;br&gt;
Let me illustrate this with a practical example.&lt;/p&gt;

&lt;p&gt;Imagine your system is rolling out a promotional discount code for the holiday season, a one-time code exclusively for customers who’ve been on the platform for over a year.&lt;/p&gt;

&lt;p&gt;The Traditional QA Approach&lt;br&gt;
As a QA engineer, you’d start with the happy path:&lt;/p&gt;

&lt;p&gt;Verify that only customers with 1+ year tenure are eligible&lt;br&gt;
Confirm the discount applies successfully at checkout for eligible customers&lt;br&gt;
Then you’d test the obvious edge cases:&lt;/p&gt;

&lt;p&gt;What happens if a customer tries to apply the same code twice sequentially?&lt;br&gt;
Most systems handle this well, the second attempt gets rejected because the code is already marked as used.&lt;/p&gt;

&lt;p&gt;Test passed. Ship it, right?&lt;/p&gt;

&lt;p&gt;The Security Lens: Where QA Meets Cybersecurity&lt;br&gt;
Here’s where the security mindset diverges from traditional QA thinking.&lt;/p&gt;

&lt;p&gt;The QA question: “Can I apply it twice sequentially?”&lt;br&gt;
System response: No&lt;/p&gt;

&lt;p&gt;The Security question: “Can I apply it twice simultaneously?”&lt;br&gt;
System response: Potentially… Yes&lt;/p&gt;

&lt;p&gt;This is a race condition vulnerability. If the database read operation (checking whether the code has been used) and the write operation (marking it as used) aren’t properly locked, two parallel requests can both pass the validation check before either one updates the database.&lt;/p&gt;

&lt;p&gt;The result? The same promo code gets applied twice, bypassing business logic entirely.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftroyfib24pel7t2styaz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftroyfib24pel7t2styaz.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How traditional vs threat driven QA conducts testing.&lt;br&gt;
The Gap Between Quality and Security&lt;br&gt;
Here’s the fundamental difference: QA engineers think like users. Attackers think like adversaries.&lt;/p&gt;

&lt;p&gt;Traditional QA follows sequential logic mimicking how a normal user would interact with the system. One action, then the next. If something breaks along that path, we catch it.&lt;/p&gt;

&lt;p&gt;But attackers don’t wait for their turn. They don’t follow the script. While we’re testing “What happens when I click this button twice?”, they’re exploiting race conditions, manipulating request timing, and probing the invisible gaps between database operations.&lt;/p&gt;

&lt;p&gt;The mindset shift from QA to security isn’t about learning new tools; it’s about questioning the assumptions our tests are built on.&lt;/p&gt;

&lt;p&gt;This is where QA engineers with security awareness become invaluable. You’re already testing edge cases and unexpected inputs. The next step is asking: What if those unexpected inputs arrive at unexpected times?&lt;/p&gt;

</description>
      <category>career</category>
      <category>security</category>
      <category>testing</category>
    </item>
  </channel>
</rss>
