Sign in to view Hunter’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Frankfurt, Hesse, Germany
Sign in to view Hunter’s full profile
Hunter can introduce you to 10+ people at Continental
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
646 followers 437 connections
Sign in to view Hunter’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Hunter
Hunter can introduce you to 10+ people at Continental
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Hunter
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Hunter’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Websites
- Personal Website
- https://hunterxxx.github.io/
- RSS Feed
- https://www.hunterisgod.com/
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Services
Activity
646 followers
- Hunter Foo shared thisI’m happy to share my first CVE 🎯 CVE-2025-65790 — a reflected SVG-based XSS in FuguHub 8.1. This isn’t a groundbreaking vulnerability, but it was a great learning experience end-to-end: identifying the issue, preparing a proper report, coordinating responsible disclosure, and going through the MITRE CVE process. Most importantly, I now know how to report and publish CVEs correctly and I plan to continue doing so. CVE-2025-65790 will always be my first, a small but meaningful milestone that will always be associated with my name. Public advisory & details: https://lnkd.in/eyJW9_tk https://lnkd.in/eS3gdDUa More to come 🙂 #cybersecurity #appsec #infosec #cve #learningbydoing #responsibledisclosure #vulnerabilityresearch #pentestGitHub - hunterxxx/FuguHub-8.1-Reflected-SVG-XSS-CVE-2025-65790: Reflected Cross-Site Scripting (XSS) via SVG Rendering in FuguHubGitHub - hunterxxx/FuguHub-8.1-Reflected-SVG-XSS-CVE-2025-65790: Reflected Cross-Site Scripting (XSS) via SVG Rendering in FuguHub
- Hunter Foo shared this🎉 Exciting News! 🎉 I'm thrilled to share that I've passed my SANS 560 and earned the prestigious GIAC Certifications Penetration Tester (GPEN) certification! 🚀 It's been an incredible journey, and I'm grateful for the opportunity to deepen my skills and knowledge in penetration testing. 💼 I dedicated three annual leaves to prepare for this exam, and it's incredibly rewarding to see my hard work pay off. 📚✏️ Special shoutout to my trusty books with their sticky notes – they've been my companions throughout this journey! 😂📖 I'm excited for the new opportunities and challenges that lie ahead with my GPEN certification. Let's keep pushing boundaries and striving for excellence together! 💪 https://lnkd.in/gXx3Vshz #GPEN #SANS560 #PenetrationTesting #Cybersecurity #CertificationSuccess #AlwaysLearning
- Hunter Foo shared this📈 Just rode the wave on my isolated margin long trade of $BNB on KuCoin! 🚀 Exciting times as Binance catches up with the BRC-20 trends! Are you considering diving in? For those interested, here's my reference code for KuCoin: QBSS9FV7 Wondering if $KCS is poised for the next big move? 😁 https://lnkd.in/eqzMgZBk #Binance #KuCoin #BRC20 #BNB #KCS #CryptoTrading
- Hunter Foo shared thisWeb100 Writeup from Reply Cybersecurity challenge 2023. With an automated Python script :)Reply Cyber Security Challenge 2023: Web 100 WriteupReply Cyber Security Challenge 2023: Web 100 Writeup
- Hunter Foo shared thisMisc 100 challenge writeup for 24 Hours CTF last Friday :)Reply Cyber Security Challenge 2023: MISC 100 WriteupReply Cyber Security Challenge 2023: MISC 100 Writeup
- Hunter Foo posted thisAre you interested in working as a penetration tester/ethical hacker? We are still looking for two positions to join our team! - Remote work - Based in Germany - Must have IT/pentesting (preferred) work experience Tasks: Web, System, Infrastructure, Network, Software #pentesting #work #ethicalhacking #pentester
- Hunter Foo shared thisWindows has a built in VM. Have you tried it? You can set it up in a minute by following the steps on my article below. #windows
- Hunter Foo shared thisSharing my experience and tips on CEH Practical. In the Github URL, I have documented iLab tasks that are important for the exam: https://lnkd.in/g3cxXTZG #experience #ceh #oscp #cehv12 #github
- Hunter Foo shared thisI got a discount code 2 weeks ago and decided to take the exam. Passed the exam with a score of 19/20. It was a 6 hours CTF style exam, I spent 2,5 hours on all the questions. Tools I used: Hydra, metasploit, wpscan, Veracrypt, SQLMap, nmap, QuickStego, BCEncoder, Phonesploit, Microsoft RDP, Wireshark, snmp-check, (OWASPZAP) Note: File Upload Vuln (DVWA), MD5 comparison (HashCalc) It was a fun exam and a good pre-OSCP preparation. I have written a blog post which will help you to pass the exam: https://lnkd.in/gij4NGx6 Important iLab Tasks: https://lnkd.in/g3cxXTZG Let me know if you need more tips on the practical exam! #ceh #oscp #whitehat #hackers
- Hunter Foo liked thisGoogle did it again… and this one actually surprised me. They’ve just released Stitch, and honestly, it might be one of the best prototyping tools I’ve seen so far. Especially for developers who are… let’s say not exactly known for their design skills (speaking from personal experience here). I gave it a try and quickly generated a clean design for a musician-focused app, both mobile and web versions in just a few seconds. The result is amazing. If you’ve ever spent hours trying to make something “look decent” instead of actually building it, this might be worth checking out. 🔗 https://lnkd.in/dw4G4xBp
- Hunter Foo liked thisHunter Foo liked thisRemote Code Execution (RCE) in Yamaha synthesizers: an exploit in MIDI files & a hidden backdoor 🎹♫💉👨🏻💻🎉 Security researcher and musician Anna Antonenko, aka "porta," shares her security research on the Yamaha PSR-E433: it looks like the device accepts special MIDI messages that allow commands to be executed. A hidden (or at least undocumented) backdoor inside Yamaha devices? :) The author dumped the firmware via JTAG, reverse-engineered it, and found a hidden command shell with a hardcoded password "#0000". Since the shell worked through MIDI system-exclusive messages, it could be triggered by a specially crafted MIDI file. Quite an impressive and very interesting journey of security research that includes hardware, firmware, and music (MIDI). I wonder if you have a hobby you can hack? More details: Remote code execution via MIDI messages. Presentation [Youtube]: https://lnkd.in/d7VfQenB Slides [PDF]: https://lnkd.in/dekQW-qy #cybersecurity #Yamaha #music #hacking #art #vulnerability #infosec #data #tech #attack #cyber #security #research #JTAG #backdoor #artist
- Hunter Foo liked thisCybersecurity continues to be important for the BMW Group as well as for the whole industry - safeguarding not only our products, plants, and IT infrastructure, but also the vital trust our customers place in us. It was a real pleasure to host and participate in the BMW Group Cyber Security Summit 2026 alongside my team today in Munich. With several hundred participants, inspiring expert talks, and hands-on live demos from across our organization, this year’s edition truly stood out. A big thank you to all external speakers for their valuable contributions. Cybersecurity is a collective effort, and this day was a strong reminder of the impact we create together. Our commitment to open exchange was highlighted through the participation of CSSA (Cyber Security Sharing & Analytics) e.V. and its members from Allianz, BASF, Bayer, Bosch, Deutsche Bahn, Deutsche Bank, E.ON, Sparkasse finanz informatik, Fresenius Medical Care, Henkel, Infineon Technologies, Mercedes-Benz AG, Munich Re, SAP, Siemens and Deutsche Telekom. The shared practices strengthen all of us — and our summit proved exactly that. Let’s keep the momentum going as we continue building a secure future. #BMWCSS26 #BMWGroup #CyberSecurity #ConnectAndProtect #ITSecurity #rockIT
- Hunter Foo liked thisHunter Foo liked this💊 Hard pill to swallow: Most orgs don't really care if a pentester finds vulnerabilities. They care about compliance, audit trails, and having something to keep their butts out of prison when regulators show up. Say you're the CISO of Megabank. You get popped via a boring SQL Injection, $200M in shareholder value evaporates, and regulators come knocking. Having something to defend yourself in that moment is why most orgs do a pentest.
- Hunter Foo liked thisHunter Foo liked thisI’m very pleased to share that, after several months of preparation and a rigorous evaluation process, I have earned the GIAC Web Application Penetration Tester (GWAPT) certification from GIAC Certifications. I’m especially grateful to Aaron Cure for the guidance, teachings, and practical advice on how to approach the exam effectively. Your insights made a real difference throughout the process. Looking forward to continuing to grow in web application security and applying this knowledge in my day-to-day work. #GWAPT #CyberSecurity #WebAppPentesting #GIAC #InfoSecGIAC Web Application Penetration Tester (GWAPT) was issued by Global Information Assurance Certification (GIAC) to Jorge Eduardo Rivadeneira Munoz.GIAC Web Application Penetration Tester (GWAPT) was issued by Global Information Assurance Certification (GIAC) to Jorge Eduardo Rivadeneira Munoz.
- Hunter Foo reacted on this✨Grateful to share that I’ve completed all my professional papers ✨ I started my journey with SBR and passed it on my first attempt — a great confidence booster. But the next paper turned out to be the toughest, and after three attempts, my confidence was definitely shaken 😰 Balancing work and study was never easy, but with the support around me, I kept going. I’m thankful that I managed to pass SBL and AFM on my first attempt, even with limited preparation time. A special shoutout to my seniors and friends (you know who you are) who encouraged me to take my final paper in the last December sitting — you believed in me more than I believed in myself. Your support truly kept me going 🫡 Not to forget, a heartfelt thank you to the firm PwC Malaysia for providing study leave and exam leave — it made balancing work and study so much more manageable. To all my buddies still preparing for your papers: stay strong and keep pushing. It’s not an easy journey, but your hard work will pay off. Sending courage to each of you — you’ve got this👊 Most importantly, thank you to myself for bravely taking on this journey 😂 This achievement means a lot, and I’m truly grateful for everyone who walked this journey with me 🙏 #ACCA
Experience & Education
-
Top Elektro Haus
****
-
***********
************* *********** ******
-
****** ******** ******** *****
********* ******** *********
-
*********** *******
********** ****** ******** ******* undefined
-
-
******** **********
**********
-
View Hunter’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
-
-
-
-
From the Big Bang to Dark Energy
Coursera Verified Certificates
-
-
AstroTech: The Science and Technology behind Astronomical Discovery
Coursera Verified Certificates
-
-
Honors & Awards
-
Champion in cyber security challenge
Continental AG
Capture the flag competition.
Tasks focusing on Raspberry Pi and its embedded board: LPC11CX2_CX4.
Buffer overflow, brute force, read the morse code, timing attack, BrainFuck and etc. -
SAP Innojam 2016
SAP & Volkswagen
A week of Hacking and meeting of people all around the world at CeBIT @ Hannover Messe.
I led a team of 5 to build an Android app that ensure the safety of the drivers.
We utilized voice, pitch, Google Map API and SAP HANA Cloud.
2 Developers, 2 Designers and 1 Business girl. -
Hack and Wear Hackathon
Salesforce, Accenture
3rd Prize for developing wearable apps "Medicolus" for Oculus Rift and Moto 360.
Languages
-
German
Full professional proficiency
-
Chinese
Native or bilingual proficiency
-
English
Native or bilingual proficiency
-
Malay
Professional working proficiency
-
Russian
Elementary proficiency
-
Spanish
Elementary proficiency
View Hunter’s full profile
- See who you know in common
- Get introduced
- Contact Hunter directly
Other similar profiles
- Mahdi Shaker
Mahdi Shaker
Toyota Material Handling Deutschland
595 followersIsernhagen Farster Bauerschaft
Explore more posts
-
Josh Shaul
6K followers
Most companies invest heavily in employee phishing training. Yet phishing still drives most breaches. Recent research from ETH Zurich shows “embedded” phishing training reduced click rates by only 2% over eight months. The small drop came from short-term reminders, not real learning. Even worse, 75% of employees spent less than one minute reviewing post-click materials, and many closed them immediately. Some even finished training more confident but not more capable, a false sense of security that increases risk. Awareness training is not a viable defense. Human error is steady and predictable. Real protection comes from speed, automation, and visibility.
37
5 Comments -
Pravesh Gaonjur
TYLERS • 4K followers
Audits and forensics aren’t witch-hunts to “name the hacker.” They’re how you stop the next breach. A good audit/forensic review will: Expose misconfigurations and control gaps Surface broken processes (people • tech • vendors) Produce a clear timeline to improve response Provide evidence for insurance claims and regulators Demonstrate senior management intent and due diligence One breach costs more—in money, trust, and time—than doing the work properly up front. At Tylers, we turn incidents into hardening plans: fixes, owners, deadlines. Not blame—better security. #CyberSecurity #DigitalTrust #Forensics #Audit #IncidentResponse #Tylers
17
2 Comments -
Connor Cady
MSP Pentesting • 4K followers
The pentest market is getting saturated. But somehow, pricing hasn’t caught up? We see firms charging $12K to $20K for the same talent others get for $4K. Same tester. Same tools. Different logo. Then there’s the other end of the spectrum. MSPs selling vulnerability scans with a cover page and calling it a pentest. (You know who you are.) So how are some firms still able to charge top dollar? Trust. Brand. Confusion? A SaaS CEO getting SOC2 can’t tell the difference and there’s no real enforcement body making them understand. National Institute of Standards and Technology (NIST) does mention the use of "testers" in pentesting and says nothing about automated or AI driven pentesting when defining pentesting (https://lnkd.in/g8VN-Mc7)... the AICPA is nowhere to be found and peer reviews don't work if you both are using automated pentesting on SOC2... PCI DSS has a manual pentesting standard. The market is shifting though. More talent. More scrutiny. More demand for results, not fluff. You can’t fake the value forever.
30
-
Mark Thomasson
Cyber Threat Intelligence… • 12K followers
Munich Security Conference released this 123-page report Munich Security Index - https://lnkd.in/eMiZBETf. The findings show that G7 countries (🇨🇦🇫🇷🇩🇪🇮🇹🇯🇵🇬🇧🇺🇸) ranked "cyber-attacks on their country" as their top concern in 2025, followed by "economic or financial crisis" and "disinformation campaigns from enemies."The Munich Security Index data suggests that trade wars, economic coercion, and geopolitical rivalry are increasingly perceived as systemic risks.
16
-
Jane Mugi
Jomo Kenyatta University of… • 3K followers
The Biggest Cybersecurity Vulnerability? It’s Not Technology! It’s people. No firewall can stop someone who willingly gives away their password. That’s why social engineering works. It doesn’t attack systems. It attacks emotions. ⚠️ Urgency — “Act now or your account will be closed.” ⚠️ Fear — “Suspicious login detected.” ⚠️ Authority — “Message from HR / CEO / IT Support.” Phishing emails don’t say, “Hi, I’m a hacker.” They look like: • Bank alerts • HR updates • Delivery notifications They look normal. That’s the danger. The real security skill? ✔️ Check the sender’s address carefully ✔️ Hover over links before clicking ✔️ Pause before reacting Technology matters. But awareness is a security control. A strong security culture will always outperform expensive tools. Cybersecurity isn’t just technical. It’s psychological. #Cybersecurity #SocialEngineering #PhishingAwareness #InfoSec #CyberSecurityCareers #SecurityCulture
25
1 Comment -
Khalid Saifullah
CyberGuardian Hub • 1K followers
Your Webflow site has 5 critical security vulnerabilities right now. This is PART 4 of my Website Security Series - focusing on Webflow-specific blind spots most designers miss. I've audited 100+ Webflow projects and these are the most dangerous gaps I consistently find. Each fix takes 5-10 minutes but protects you from: → Data breaches → Spam attacks → Unauthorized access → Client data exposure Swipe through for the exact step-by-step fixes → Missed the previous parts? Check my recent posts: 📌 Part 1: WordPress Security Essentials 📌 Part 2: Shopify Security Essentials 📌 Part 3: WIX Website essentials Which security blind spot will you tackle first? #WebflowSecurity #WebSecurity #WebDesign #FreelanceDesigner #WebDevelopment #SecuritySeries #Part4 👉 Follow for Part 5: Squarespace Security
8
6 Comments -
🔐Andi Heckel
cybovate • 12K followers
Let’s face it – traditional security isn’t built for this. 357,000+ active stolen German credit cards. - Fake PhotoTAN flows that beat your MFA. - Infostealer logs traded like groceries on Telegram. - Phishing kits more convincing than real banking apps. And still… most companies focus on what’s inside the perimeter. Meanwhile, attackers know your infrastructure better than you do. They map your exposed assets. Monitor your executives. Abuse your brand – and sell it in underground chats. 👉 The latest Brandefense Germany Threat Report shows it clearly: The threat is external, fast-moving, and personalized. So why are so many teams still busy scanning servers instead of watching the real battlefield? If you want to regain the initiative, start where attackers start: Monitor what they see. Understand what they trade. Act before they strike. We can show you how – in 7 days. #Cybersecurity #ExternalAttackSurface #DarkWebMonitoring #Phishing #Infostealer #DigitalRiskProtection #BrandAbuse #ThreatIntelligence
43
6 Comments -
Tom O'Malley
Scam Wize Initiative (Wize Up… • 8K followers
Lost iPhone? Don’t Fall for Phishing Texts Stating It’s Been Found “The Swiss National Cyber Security Centre (NCSC) is warning iPhone owners about a phishing scam that claims to have found your lost or stolen iPhone but is actually trying to steal your Apple ID credentials. When iPhone customers lose their phone or it is stolen, they can set a custom message [https://lnkd.in/e4e6yB8D] in Apple's Find My app that appears on the lock screen. When lost, this message may include an email address or phone number to contact the owner. According to the NCSC, threat actors may be using this information to send targeted phishing texts (smishing) through SMS or iMessage to the displayed contact information, claiming to be from Apple's Find My team and stating that their phone had been found. ‘Losing your iPhone is always annoying. Not only is the device gone, but your personal data may also be lost,’ explains the NCSC [https://lnkd.in/e2Y6xqu3]. ‘Once the initial panic has passed, most people are left hoping that someone honest will find it. But if scammers have your phone, they may try to exploit this hope. They send text messages or iMessages that appear to come from Apple, claiming that the lost iPhone has been found abroad.’ The phishing message includes convincing details such as the phone's model, color, and any other information that can be extracted directly from the locked device. ‘We are pleased to inform you that your lost iPhone 14 128GB Midnight has been successfully located,’ reads the phishing text. ‘To view the current location of your device, please click the link below: <phishing url>’ ‘If you did not initiate a lost device report or believe this message was sent in error, please disregard it or contact our support team immediately.’ The phishing message contains a link to the alleged Find My website that shows the device's location. However, instead of leading to Apple's official website, it redirects to a phishing page with a login prompt that mimics Apple's Find My website. When victims enter their Apple ID and password, the credentials are sent to the attackers, giving them full access to the account.” https://lnkd.in/e_QQ52rS
13
3 Comments -
Matt Ashburn
Authentic8 • 2K followers
Most “OSINT” isn’t OSINT-- and that’s okay. I've noticed we often use OSINT to mean "online research" or “I quickly looked it up online.” It's 100% valuable work, but the INT matters: requirements → collection → processing → analysis → dissemination. That’s intelligence. PAI collection (including quick searches, data pulls, screenshots, and other collection from open sources) is different-- and mission-critical. It enables investigations, intelligence operations, and ensures awareness of fast-breaking events. But, calling everything OSINT can blur roles, weaken standards, and undersell the speed/value of great non-OSINT PAI work. Questions for you: • In your org, do you distinguish PAI collection from those building finished OSINT products? • For fast-paced PAI collection, do you use lightweight intel-cycle steps (requirements, confidence statements, source grading) and do they actually stick? • Any thoughts on non-OSINT PAI collectors leveraging similar tradecraft (eg. training, standards, managed attribution) as dedicated OSINTers? Not trying to be pedantic; rather, naming work precisely helps resource both disciplines correctly and reduces risk. Both PAI and OSINT collect information from open sources, but the output/goal is different. Curious to hear what’s working (and what isn’t) in your world. #OSINT #PAI #Tradecraft #CTI #OPSEC #ManagedAttribution
28
3 Comments -
💻Dan Draper
CipherStash • 9K followers
3 years ago we realized that the best way to protect data was to encrypt every single sensitive value with a different key. That means if you use CipherStash every email address, dob, medicare number or SSN stored in your database is encrypted using a different key. 1000 email addresses = 1000 keys. Nuts, right!? We thought so too at first but it turns out this approach has some powerful advantages. And because CipherStash is so fast, it's very practical as well. In traditional systems, a single key will be used to encrypt thousands or even millions of values. This is the only practical solution for current cloud-based tools because lack the performance for anything more granular. The problem is that for security teams, knowing if a key was used doesn't provide any information about what data was decrypted. Audit logs are therefore broad-brushed: they can only record if one of perhaps 1000s of unique values or customer records were accessed. 🔑 Key per value encryption solves that! Because every key can uniquely identify what data was accessed, audit logs become powerfully precise. Now it's possible to identify exactly how data is being accessed without knowing anything about the data itself! For many of our customers having this visibility has revealed some surprising results in how their data is being accessed. Plus, because everything remains encrypted they get none of the risks of traditional access logging tools. It turns out having a bold idea can pay off if you stick at it :)
58
15 Comments -
Prathamesh Bakliwal
Secure Sleuths • 6K followers
A client hired me to fix a Wazuh setup that was generating 400,000 alerts a day. Someone had done the installation before me. Basic setup, no tuning, walked away. The client was left with a dashboard that never stopped screaming. 400,000 alerts. Every single day. Nobody was looking at them. Not because the team didn't care because no human can process 400,000 alerts a day. So they did what anyone would do. They ignored the dashboard entirely. I started tuning. Rule by rule. False positive by false positive. Misconfigured threshold by misconfigured threshold. When I was done, the daily alerts dropped to 197. Here is what was in those 197. Active attack attempts on their infrastructure. Failed login attempts on sensitive accounts, repeated, pattern-based, the kind that suggest someone was methodically trying to get in. These weren't new threats. They had been happening while the dashboard was screaming 400,000 alerts a day. Buried under the noise. Invisible because everything looked equally urgent. 400,000 alerts means nothing is a priority. 197 alerts means your team can actually respond. The goal of a SOC isn't more visibility. It's the right visibility.
225
6 Comments -
Troy Fine
Fine Assurance • 39K followers
Do you know how to do identify a Qualified Opinion in a SOC 2 report? Well, it's actually not that difficult, as long as you read the Service Auditor's Report (most of the time labeled as Section 1). In the Service Auditor's Report, there will be a paragraph labeled "Basis for Qualified Opinion". Then in the "Opinion" paragraph right below it, it will include language such as, "except for the matter described in the preceding paragraph". In the example attached, the system description was fairly stated, the controls were suitably designed, but the opinion was QUALIFIED for the operating effectiveness of controls. An Unqualified Opinion will not have an additional paragraph added to the Service Auditor's Report and the "Opinion" paragraph will state that the system description was presented in accordance with the description criteria and the controls were suitably designed and operating effectively to meet the applicable trust services criteria. The "except for" language will not be included. So, the real question. What do TPRM teams when they come across a prospective vendor that has a SOC 2 report with a Qualified Opinion?
79
28 Comments -
Harry Wang
University of Delaware • 6K followers
Many of you may be following the recent OpenReview API bug and the related ICLR incident. A surprisingly simple flaw exposed author and reviewer identities, emails, etc. — completely breaking the double-blind process. My guess is that the frontend hid identities, but the API still returned sensitive fields that should never have been exposed — a classic data over-exposure issue. My point is: this kind of issue is easy for today’s AI coding tools to catch, yet many organizations still aren’t doing it. We run simple security-audit prompts regularly, and they’ve already helped us surface and fix several vulnerabilities in our own system. As more code is written or refactored by AI, subtle security holes can slip in unnoticed. That’s why regular AI-powered security reviews should be a standard part of every development workflow. The attached image was generated using NotebookLM based on the news at https://lnkd.in/g2KhWjWP #SoftwareDevelopment #APISecurity #AISecurityAudits #OpenReview #ICLR #DoubleBlind #Academic
33
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content