Debunking: GitHub MCP ExploitedRecently, Invariant Labs published a blog post titled “MCP GitHub Vulnerability” (see here) , a post that makes some broad claims about…May 30May 30
The Security Risks of Model Context Protocol (MCP)The Model Context Protocol (MCP), pioneered by Anthropic, is rapidly gaining traction as the de facto standard for enabling Large Language…Apr 17A response icon1Apr 17A response icon1
Analyzing HTTP/HTTPS Traffic with StratosharkUnderstanding System Calls: The Key to Cloud-Native Security and ObservabilityJan 24A response icon1Jan 24A response icon1
Confessions of a HackerBridging the Gap Between Security, Development, and OperationsDec 16, 2024Dec 16, 2024
Ollama Tool Support and Call Interception Using MITM ProxyEnhance Your AI Models with Ollama Tool Support and API Call Interception Using MITM Proxy — A Step-by-Step Guide”Aug 9, 2024Aug 9, 2024
Bridging Boundaries: Building a Multi-Region Cilium Clustermesh with FortiGate VPN in AWSIntroductionMar 7, 2024A response icon1Mar 7, 2024A response icon1
Running the Phi-2 on Ollama !Large Language Models (LLMs) are fascinating, and their benefits are obvious and well discussed all over the internet. However, it’s also…Dec 23, 2023Dec 23, 2023
Enhancing Security in DevSecOps and Kubernetes: Best Practices for Navigating the Threat LandscapeIn the domain of software development, the concept of DevSecOps — melding security with DevOps practices — is a transformative approach to…Nov 9, 2023Nov 9, 2023