Ax Sharma

Contributor

Ax Sharma is an experienced security researcher, engineer and tech columnist. He holds the British Government endorsement as an Exceptional Talent ("a recognized leader") in digital technology. Ax's articles, expert opinions and analyses have frequently featured on leading media outlets like Fortune, CIO, The Register and TechRepublic. His expertise lies in software development, vulnerability research, and web app security. Through responsible disclosure, Ax has previously exposed serious bugs and security vulnerabilities impacting major national and global organisations. In his spare time, Ax loves exploiting vulnerabilities ethically and writing about technology.

Securing CI/CD pipelines: 6 best practices

15 top open-source intelligence tools

15 top open-source intelligence tools

OSINT (open-source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.

6 most common types of software supply chain attacks explained

6 most common types of software supply chain attacks explained

Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.

5 ways hackers hide their tracks

5 ways hackers hide their tracks

From trusted pentesting tools to LOLBINs, attackers abuse trusted platforms and protocols to evade security controls.

15 open source GitHub projects for security pros

15 open source GitHub projects for security pros

GitHub has a ton of open-source options for security professionals, with new entries every day. Add these tools to your collection and work smarter.

DNS over HTTPS, DNS over TLS explained: Encrypting DNS traffic

DNS over HTTPS, DNS over TLS explained: Encrypting DNS traffic

DoT and DoH provide data confidentiality with end-to-end encryption for DNS traffic, but each has trade-offs.

5 tips for a successful penetration testing program

5 tips for a successful penetration testing program

Proper preparation is key to finding the real weaknesses and vulnerabilities in your network through a pentest. These are the five things you need to do before starting.

The state of the dark web: Insights from the underground

The state of the dark web: Insights from the underground

The rise of professional criminal gangs, malware as a service, and improved infrastructure for carrying out criminal activity are changing the dark web. Here's what that means for enterprise security.

The Windows Bad Neighbor vulnerability explained — and how to protect your network

The Windows Bad Neighbor vulnerability explained — and how to protect your network

Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available.

Windows code-signing attacks explained (and how to defend against them)

Windows code-signing attacks explained (and how to defend against them)

Learn how code-signing attacks work and how to defend against them. It starts with patching.

Homomorphic encryption: Deriving analytics and insights from encrypted data

Homomorphic encryption: Deriving analytics and insights from encrypted data

Homomorphic encryption allows safe outsourcing of storage of computation on sensitive data to the cloud, but there are trade-offs with performance, protection and utility.

4 best practices to avoid vulnerabilities in open-source code

4 best practices to avoid vulnerabilities in open-source code

Open-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.

Load More