|
Blog
AI for Security
Security for AI
Vulnerability Research
Web2
Web3
🌐
🌐
Open main menu
Search posts...
Internal Traffic (traffic_type=internal)
Accessed from the dashboard.
This session is not logged.
Theori BLOG
Empowering Innovation with Security
Explore expert insights into offensive security and threat intelligence.
Xint
Importance of Continuous Security: Lessons from the Bybit Case
In this article, we briefly look at the circumstances of the Bybit incident and discuss what countermeasures could have been implemented. Then, we discuss the limitations of current solutions and how Xint resolves them.
Mar 27, 2025
AI for Security
The True Cost of Siloed Security Tools
Security silos occur when different security tools, teams, or systems operate in isolation, unable to effectively share data or communicate.
Dec 20, 2024
AI for Security
Side Effects: When Continuous Development Introduces Security Threats
Dive into five significant security risks that emerged as unintended consequences of new feature development.
Nov 04, 2024
Web2 Security
Top 5 Features Your ASM Solution Must Have
So you know what ASM is and why you need it — but which features are crucial? Here’s the run down.
Oct 24, 2024
AI for Security
Offensive Security with Large Language Models (2)
How LLMs are changing the game for static analysis — especially when source code is available.
Sep 30, 2024
AI for Security
Offensive Security with Large Language Models (1)
Applications of larage language models in offensive security
Sep 27, 2024
AI for Security
Winning the AIxCC Qualification Round
Theori’s Cyber Reasoning System (CRS) “Robo Duck” not only cleared the bar to get us $2M and a spot at the AIxCC finals in 2025, it also got the first place among all the submissions in the highly competitive event.
Sep 23, 2024
AI for Security
Top Penetration Testing Solutions for IT Security: 2024 Guide
The top 7penetration testing tools of 2024 for hackers and for businesses.
Sep 11, 2024
AI for Security
Offensive Security vs. Defensive Security: Navigating the Two Pillars of Cybersecurity
Explore how offensive and defensive security strategies work together to protect against cyber threats.
Aug 30, 2024
Web2 Security
Theori © 2025 All rights reserved.
RSS
·
Powered by Inblog