top of page

BLOG
Search


The New Attack Surface: How to Break (and Defend) Large Language Models
An expert, slightly dangerous guide inspired by OWASP and recent research. 1) The Situation (and why it’s not “just prompts”) Large Language Models now automate customer support, write code, classify emails, generate content, and - disturbingly - execute tasks through plugins and agents. Once an AI can act on your behalf, it becomes part of your operational infrastructure , not a toy. OWASP’s Top-10 for LLM Applications formalized the threat landscape, and quietly confirmed
Komodo Research_maya933
Nov 6, 20253 min read


Patch the Browser you Code in
AI IDEs like Cursor and Windsurf bundle Chromium. If that engine is not up to date, it carries known vulnerabilities. AI IDEs such as Cursor and Windsurf include their own browser engine. If that engine is not up to date, it carries known vulnerabilities. This week’s signals show Cursor 2.0 released on Oct 29, 2025 without a stated browser upgrade in the Cursor 2.0 changelog. Users also posted About screenshots that still show older builds. Windsurf’s October notes list a ne
Komodo Research_maya933
Oct 30, 20253 min read


Salesforce OAuth Incident: Safe Re-enable Path for Drift and Salesloft, How to Fix
A clean, safe re-enable path for Drift and Salesloft Attackers stole OAuth tokens tied to the Salesloft Drift integration, then used those valid tokens to call Salesforce APIs and export data. This is token abuse via a third-party Connected App, not a core Salesforce bug. Focus your response on governance and validation: revoke and rotate, re-enable with least privilege, and use Salesforce Event Monitoring to verify detections. This incident highlights a classic Salesforce Dr
Komodo Research_maya933
Sep 9, 20253 min read


PowerShell SMB Scanner: Lightweight Tool for Red Team SMB Enumeration (OpenSource)
PowerShell-based SMB scanner can identify shared folders and sensitive files on target systems. SMB-Scanner A lightweight,...
Komodo Research
Feb 13, 20253 min read


How SMB Misconfigurations Can Lead to Full Network Takeover: A Red Team Case Study
A real-world red team case study reveals how a simple tool led to full network compromise. Server Message Block (SMB) is a ubiquitous...
Komodo Research
Jan 31, 20255 min read


How CISO as a Service can Improve Your Security Posture and Reduce Costs
Unlock the Power of CISO as a Service: Enhance Security & Cut Costs with Expert Solutions! Cybersecurity is a critical and complex...
Komodo Research
Aug 30, 20244 min read
bottom of page