top of page
Search

AI-Powered Investment Scams Ruin COINBLACK – WENDMINE, Stealing $20 Million
Detailed Analysis Report: AI-Powered Investment Scams Leading to $20 Million Theft Introduction In a recent operation dubbed "COINBLACK –...
Nox90 Engineering
16 hours ago2 min read
0 views
0 comments

How to Cut Through Tool Sprawl and Build a Cohesive AppSec Strategy
Let’s start with a moment of brutal honesty: if you walked over to your DevSecOps lead right now and asked, “How many security tools are...
Nox90 Engineering
2 days ago4 min read
3 views
0 comments

Gennomis Data Leak: Exposing Underage Deepfake Concerns and AI Misuse
Detailed Analysis Report on Gennomis Exposure of Underage Deepfakes Introduction Recently, a significant data leak from the AI image...
Nox90 Engineering
4 days ago2 min read
3 views
0 comments

GitHub Actions Supply Chain Attack: CI/CD Security Breach in tj-actions/changed-files
Detailed Report on GitHub Action Compromise Impacting CI/CD Security Executive Summary In March 2025, a significant supply chain attack...
Nox90 Engineering
4 days ago2 min read
0 views
0 comments

Critical Analysis of the Storm-2372 Device Code Phishing Campaign Targeting Microsoft Authentication Systems
Storm-2372 Device Code Phishing Campaign: A Critical Analysis Executive Summary Storm-2372, a threat actor with suspected ties to Russian...
Nox90 Engineering
Apr 13 min read
0 views
0 comments


The Hidden Cost of Application Security Failures: A Guide for R&D Leaders
You’re Delivering Fast, But at What Cost? Deadlines are looming. Features need shipping. Your team is pushing code to production at...
gd2285
Mar 163 min read
4 views
0 comments


Access Control
Security is a top priority in the modern world, and for good reason. With data breaches becoming increasingly frequent, organizations...
Nox90
Dec 5, 20235 min read
41 views
0 comments


PCI DSS v4.0 - Updates You Need To Know
Digital payment technology is an incredibly valuable asset to society. It gives people the luxuries of sending money, paying others, and...
Nox90
Nov 5, 20234 min read
36 views
0 comments


AI-Driven - Predictive Analysis
Recent research shows that the average cost of a cyber breach in 2022 was $4.35M. It is predicted that cybercrime is expected to rise to...
Nox90
Sep 26, 20234 min read
31 views
0 comments


Understanding AppSec
Application Security, often abbreviated as AppSec. As we embark on this journey to understand its intricacies, we must first grasp its...
Nox90
Sep 10, 20234 min read
22 views
0 comments


Safety by Design: Best Practices in IaC Security.
The dawn of the cloud era has been nothing short of a revolution, changing the landscape of how businesses conceive, design, and manage...
Nox90
Aug 9, 20237 min read
24 views
0 comments


Securing Your Development Environment
Securing the development environment goes beyond the primary purpose of safeguarding intellectual property. It is also about ensuring the...
Nox90
Jul 26, 20236 min read
20 views
0 comments


The Human Factor
The Human Factor in Securing the Code Development Lifecycle There is nothing more Human than making misstakes. (if you read this...
Nox90
Jul 10, 20234 min read
20 views
0 comments


360° of Secure Software Development Life Cycle
A holistic approach for integrating security practices into each software development life cycle phase
Nox90
Jun 13, 20234 min read
34 views
0 comments


Securing the Digital Sky. Understanding Cloud Application Security
Cloud Application Security has rapidly evolved from a niche concern to an absolute necessity in today's digital landscape. As businesses...
Nox90
Jun 4, 20233 min read
9 views
0 comments


Utilizing Application Security Frameworks: Standards, Best Practices, and Actionable Tools
As technology advances rapidly, the need for secure, reliable applications and systems has never been more paramount. From personal...
Nox90
May 21, 20234 min read
9 views
0 comments


Practical Guide to Generative AI Risks and Mitigations for Enterprise
The main risks that those uses might bring, and will suggest a number of mitigations and controls for the security teams in the organization
Nox90
May 7, 202310 min read
549 views
0 comments


A Deep Dive into Best Practices with AWS, Azure, and GCP
Introduction: As businesses continue to embrace digital transformation, migrating to leading cloud environments like Amazon Web Services...
Nox90
Apr 27, 20234 min read
27 views
0 comments


Secure Continuous Integration 101
Ensuring applications are built, tested, and deployed securely.
Nox90
Apr 4, 20234 min read
10 views
0 comments

Nox90 Research Validates that Fastly's Signal Sciences Protects Against Recent JSON Bypass Technique
At Nox90, we take the security of our customers' systems seriously. That's why we are proud to offer the Signal Sciences web application...
Nox90 Engineering
Dec 10, 20221 min read
60 views
0 comments
bottom of page