
Enhancing Octomind with MCP Integration
Despite having built a solid foundation with Octomind that helped in our test-maintenance work and enabled manual testers to create..

Enhancing Octomind with MCP Integration
Despite having built a solid foundation with Octomind that helped in our test-maintenance work and enabled manual testers to create..

MeetC2 a.k.a Meeting C2
Modern adversaries increasingly hide command-and-control (C2) traffic inside cloud services. We built this proof of concept...

MeetC2 a.k.a Meeting C2
Modern adversaries increasingly hide command-and-control (C2) traffic inside cloud services. We built this proof of concept...

Brewing Trouble — Dissecting a macOS Malware Campaign
How a single alert led our team down a rabbit hole of sophisticated deception —and what we learned about the evolving threat landscape

Brewing Trouble — Dissecting a macOS Malware Campaign
How a single alert led our team down a rabbit hole of sophisticated deception —and what we learned about the evolving threat landscape

5 AI Agents. 1 Week. All Built By a Cross-Functional Security Team
We Built 5 Al Agents in 1 Week —Here's What We Learned About Code, Chaos, and Teamwork

5 AI Agents. 1 Week. All Built By a Cross-Functional Security Team
We Built 5 Al Agents in 1 Week —Here's What We Learned About Code, Chaos, and Teamwork

SecArchBot: AI-powered Zero Trust architecture analysis
SecArchBot, developed by Deriv Security Team, automates Zero Trust Architecture analysis in Slack. Secured integration systems with AI.

SecArchBot: AI-powered Zero Trust architecture analysis
SecArchBot, developed by Deriv Security Team, automates Zero Trust Architecture analysis in Slack. Secured integration systems with AI.

Smuggled in plain sight: SVG attacks, malware evasion, and the rise of SmuggleShield
Dhiraj Mishra- Manager offensive security deriv- research paper on art of malware Smuggling. SVG-based attack techniques

Smuggled in plain sight: SVG attacks, malware evasion, and the rise of SmuggleShield
Dhiraj Mishra- Manager offensive security deriv- research paper on art of malware Smuggling. SVG-based attack techniques

Securing GitHub Actions: Identifying, mitigating, and detecting vulnerabilities in CI/CD workflows
Essential GitHub Actions security best practices to defend CI/CD pipelines. CI/CD tool that automates testing, building, and deployment applications

Securing GitHub Actions: Identifying, mitigating, and detecting vulnerabilities in CI/CD workflows
Essential GitHub Actions security best practices to defend CI/CD pipelines. CI/CD tool that automates testing, building, and deployment applications

Low-code AI tools to build the intelligent architecture blueprint
How can low-code AI tools improve your system development? Learn how they helped us build intelligent, adaptable components with ease.

Low-code AI tools to build the intelligent architecture blueprint
How can low-code AI tools improve your system development? Learn how they helped us build intelligent, adaptable components with ease.

Engineering the future: AI innovation at Deriv
At Deriv, we're riding the wave of AI innovations. Read how we're integrating AI to automate operations and drive smarter financial outcomes.

Engineering the future: AI innovation at Deriv
At Deriv, we're riding the wave of AI innovations. Read how we're integrating AI to automate operations and drive smarter financial outcomes.
Sorry, we couldn’t find any results matching ' '.
Search tips:
- Check your spelling and try again
- Try another keyword









