Forem

Natasha Joshi profile picture

Natasha Joshi

Marketing Specialist sharing insights on growth strategies, branding, and data-driven campaigns.

Joined Joined on 
Why Most Security Tools Fail And How Better UX Fixes Them
Cover image for Why Most Security Tools Fail And How Better UX Fixes Them

Why Most Security Tools Fail And How Better UX Fixes Them

Comments
5 min read
One git push. Millions of Repositories. Full Server Access.
Cover image for One git push. Millions of Repositories. Full Server Access.

One git push. Millions of Repositories. Full Server Access.

1
Comments
20 min read
Vibe Coding Is Shipping CVEs: The Security Crisis No One Is Talking About Loudly Enough
Cover image for Vibe Coding Is Shipping CVEs: The Security Crisis No One Is Talking About Loudly Enough

Vibe Coding Is Shipping CVEs: The Security Crisis No One Is Talking About Loudly Enough

1
Comments
23 min read
SQL Injection in Python: Example, Exploitation, Detection, and Prevention
Cover image for SQL Injection in Python: Example, Exploitation, Detection, and Prevention

SQL Injection in Python: Example, Exploitation, Detection, and Prevention

Comments
19 min read
How to Prevent Prompt Injection: Why Pre-LLM Sanitization Matters
Cover image for How to Prevent Prompt Injection: Why Pre-LLM Sanitization Matters

How to Prevent Prompt Injection: Why Pre-LLM Sanitization Matters

1
Comments
14 min read
LiteLLM Hit by Credential-Stealing Supply Chain Attack: Complete Technical Breakdown
Cover image for LiteLLM Hit by Credential-Stealing Supply Chain Attack: Complete Technical Breakdown

LiteLLM Hit by Credential-Stealing Supply Chain Attack: Complete Technical Breakdown

2
Comments
22 min read
A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)
Cover image for A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

1
Comments 1
8 min read
What is Binary SAST? And Why Source Code Scanning Isn't Enough
Cover image for What is Binary SAST? And Why Source Code Scanning Isn't Enough

What is Binary SAST? And Why Source Code Scanning Isn't Enough

1
Comments
8 min read
Why the $200B Cybersecurity Industry Still Can’t Stop Breaches
Cover image for Why the $200B Cybersecurity Industry Still Can’t Stop Breaches

Why the $200B Cybersecurity Industry Still Can’t Stop Breaches

1
Comments
5 min read
Why the $200B Cybersecurity Industry Still Can’t Stop Breaches
Cover image for Why the $200B Cybersecurity Industry Still Can’t Stop Breaches

Why the $200B Cybersecurity Industry Still Can’t Stop Breaches

Comments
5 min read
The telnyx PyPI Compromise: How TeamPCP Hid Malware Inside a Ringtone
Cover image for The telnyx PyPI Compromise: How TeamPCP Hid Malware Inside a Ringtone

The telnyx PyPI Compromise: How TeamPCP Hid Malware Inside a Ringtone

1
Comments
21 min read
ASPM Helps You Prioritize, But What If the Findings Are Wrong?
Cover image for ASPM Helps You Prioritize, But What If the Findings Are Wrong?

ASPM Helps You Prioritize, But What If the Findings Are Wrong?

1
Comments
13 min read
Software Supply Chain Attacks in 2026: Why CVE Scanning Is No Longer Enough
Cover image for Software Supply Chain Attacks in 2026: Why CVE Scanning Is No Longer Enough

Software Supply Chain Attacks in 2026: Why CVE Scanning Is No Longer Enough

Comments
7 min read
Axios Under Siege: SSRF, DoS, and an Active Supply Chain RAT
Cover image for Axios Under Siege: SSRF, DoS, and an Active Supply Chain RAT

Axios Under Siege: SSRF, DoS, and an Active Supply Chain RAT

2
Comments
12 min read
BREAKING: Axios Compromised, 100M Weekly Downloads Just Delivered a RAT
Cover image for BREAKING: Axios Compromised, 100M Weekly Downloads Just Delivered a RAT

BREAKING: Axios Compromised, 100M Weekly Downloads Just Delivered a RAT

Comments
19 min read
API Security in 2026: The Attack Surface Your Pentest Is Probably Missing
Cover image for API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

Comments
20 min read
API Security in 2026: The Attack Surface Your Pentest Is Probably Missing
Cover image for API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

Comments
20 min read
API Security in 2026: The Attack Surface Your Pentest Is Probably Missing
Cover image for API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

API Security in 2026: The Attack Surface Your Pentest Is Probably Missing

Comments
20 min read
A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)
Cover image for A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

Comments
7 min read
A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)
Cover image for A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

A Complete Guide to Securing AI-Generated Code: From Pre-LLM Sanitization to AI-Native SAST (2026)

Comments
6 min read
loading...