Include Security's Avatar

Include Security

@includesecurity.bsky.social

https://includesecurity.com/

5 Followers  |  0 Following  |  5 Posts  |  Joined: 12.03.2025  |  0.8529

Latest posts by includesecurity.bsky.social on Bluesky

Preview
LLMs in Applications - Understanding and Scoping Attack Surface - Include Security Research Blog In this post we consider how to think about the attack surface of applications leveraging LLMs and how that impacts the scoping process when assessing those applications. We discuss why scoping matter...

Developers should consider how implementing LLMs into an application affects its attack surface. Likewise, pentesters assessing those applications should scope the test with that attack surface in mind. Our latest post covers both perspectives!

blog.includesecurity.com/2025/07/llms...

17.07.2025 19:12 — 👍 1    🔁 0    💬 0    📌 0
Preview
Misinterpreted: What Penetration Test Reports Actually Mean - Include Security Research Blog This month's post discusses pentest reports and how the various audiences that consume them sometimes misinterpret what they mean. We cover why findings in a report are not a sign of failure, why "cle...

Our most recent post covers various ways pentest reports are misinterpreted, including why findings aren't a sign of failure and why "clean" reports may not indicate a good security posture.

blog.includesecurity.com/2025/05/misi...

28.05.2025 18:43 — 👍 2    🔁 0    💬 0    📌 0
Preview
Cross-Site WebSocket Hijacking Exploitation in 2025 - Include Security Research Blog Include Security's latest blog post covers Cross-Site WebSocket Hijacking and how modern browser security features do (or don't) protect users. We discuss Total Cookie Protection in Firefox, Private N...

Do you use WebSockets? Read our latest blog post to find out how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking.

blog.includesecurity.com/2025/04/cros...

17.04.2025 19:59 — 👍 1    🔁 2    💬 1    📌 0
Key Review Portal

Today our team at IncludeSec is releasing a small website to help those concerned with key collisions. This easy site allows you to check if your private keys have been found to be public!

ismyprivatekeypublic.com

Please pass along to your industry colleagues who might need such a site today 💓 🦾

01.04.2025 18:00 — 👍 0    🔁 0    💬 0    📌 0
Preview
Memory Corruption in Delphi - Include Security Research Blog In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" la...

Hi all, check out our latest blog post on Delphi memory corruption vulnerabilities!

blog.includesecurity.com/2025/03/memo...

We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples.

13.03.2025 20:34 — 👍 1    🔁 1    💬 1    📌 0