CloudDefense.AI Blog
- Anshu Bansal
- Security
Open-Source Intelligence (OSINT) is the practice of collecting and analyzing publicly available data for intelligence purposes.
- Anshu Bansal
- Security
Proactive Risk Management is the strategy of identifying and addressing potential risks before they impact business operations.
- Abhishek Arora
- Security
Microsegmentation strengthens cybersecurity by breaking networks into secure, isolated zones to limit attacker movement and contain threats. Why Traditional Segmentation Approaches Aren’t Enough? Too Complicated First off, traditional segmentation is a real headache to set up. You’ve got to mess around with all these firewalls, VLANs,
- Anshu Bansal
- Security
Supply chain security is the practice of protecting every component and process involved in the development, delivery, and deployment of software.
- Abhishek Arora
- Security
Cross-site request forgery (CSRF) is a stealthy attack that tricks your browser into executing unwanted actions on trusted sites without your knowledge. What is CSRF? Cross-Site Request Forgery, often abbreviated as CSRF or XSRF, is a web security vulnerability that thrives on tricking your browser into
- Anshu Bansal
- Security
Supply-chain Levels for Software Artifact is a security framework that improves and ensures the integrity of software packages and infrastructure throughout their supply chain.
- Abhishek Arora
- Security
COBIT is a comprehensive framework that empowers organizations to align IT governance with business objectives while managing risks and ensuring compliance. What is COBIT? COBIT, or Control Objectives for Information and Related Technology, is a comprehensive framework designed to guide the development, implementation, improvement, and management
- Abhishek Arora
- Security
AI coding assistants like Cursor and Windsurf are no longer a concept for developers. It has become a widespread phenomenon. Most developers are harnessing the prowess of AI code editors to enhance their productivity and streamline complex coding tasks. However, this highly productive software development process
- Anshu Bansal
- Security
The rise of AI-based code editors is reshaping the approach towards the software development process. Among all the AI power code-generating tools, Cursor and Windsurf have emerged as the prominent solutions. Despite offering high productivity and speed in the SLDC, there is still uncertainty in the
- Anshu Bansal
- Security
DNS poisoning (or DNS spoofing) is a cyberattack that alters DNS records to redirect users to malicious websites without their knowledge.
Cloud Security






Malware vs Ransomware: Key Differences, Risks, and Prevention Strategies


Cloud Security vs Traditional Security: Key Differences and Cost-Effectiveness

Security






Secure-By-Design: Embedding AppSec into Cursor and Windsurf-Driven Development Workflow



Detecting and Fixing Vulnerabilities in Code Suggested by Cursor and Windsurf
Press

Indian State Government Fixes Website Bugs Found by CloudDefense.AI

Okta Faces Major Cyberattack as Hackers Breach Its Customer Support System

CloudDefense.AI Uncovers Exposed Database of Bangladeshi Spy Agency

CloudDefense.AI Discovers Over 3.3 Millions of Chinese IDs Exposed Online

CloudDefense.AI is now on AWS Marketplace: Simplifying Access to Expert Cloud and App Security Solutions

Unsecured Server Exposes Sensitive US Military Emails Online – Discovered by CloudDefense.AI

Scrubs & Beyond Data Breach: CloudDefense.AI Discovers Alarming Vulnerability


DPDP Bill 2023 Passed by Rajya Sabha: A Game-Changer for Data Protection in India
Testing
Application Security







Security Operations Center (SOC) Roles and Responsibilities


CI/CD Security
Threats



What are Leaky Vessels’ Vulnerabilities? How Does It Affect Your Container Environments?





