Our Blog
Insights on offensive security, research, and the evolving threat landscape
Thick Client Security Testing: Methodology and Common Vulnerabilities
Thick client applications present a unique security challenge — they run logic on the client machine, communicate with backend services, and often store sensitive data locally. Here is a comprehensive guide to testing them.
Read more →MCP Security Top 10: Securing the Model Context Protocol
The Model Context Protocol (MCP) is rapidly becoming the standard for connecting AI agents to tools and data sources. This guide covers the top 10 security risks specific to MCP implementations.
Read more →Prompt Injection: The New SQL Injection for the AI Era
Prompt injection is emerging as one of the most critical vulnerabilities in AI-powered applications. Understand direct and indirect attack vectors, real-world exploits, and how to build defences into LLM-integrated systems.
Read more →Secure Code Review: A Practical Guide to Finding Vulnerabilities in Source Code
Secure code review is one of the most effective ways to identify vulnerabilities before they reach production. Learn methodologies, tools, and patterns to review code like a security engineer.
Read more →API Security: Protecting the Backbone of Modern Applications
APIs are the connective tissue of modern software. This guide covers authentication, authorisation, rate limiting, and the OWASP API Security Top 10.
Read more →OWASP Web Top 10: Understanding the Most Critical Web Application Risks
A deep dive into the OWASP Top 10 — the most critical security risks facing modern web applications, with real-world examples and mitigation strategies.
Read more →Welcome to SabtechX Blog
Welcome to the SabtechX blog. Here we share insights about technology and development.
Read more →