Blog
Below you can find our blog posts regarding current events, securing cutting edge technologies, and more.
CVE-2025-1648 | Yawave Plugin Unauthenticated SQL Injection
Yawave’s integration connectors, including WordPress Overview Last year, Atvik Security was performing security reviews on…

CUPS Vulnerability: What You Need to Know
The CUPS Conundrum: A Perfect Storm of Vulnerabilities Picture this: four seemingly innocuous vulnerabilities that,…

Running a local LLM / AI (Ollama)
I’ve recently dove headfirst into running LLMs on my local hardware, and I wanted to…

Safeguarding Against LLM Prompt Injection: A Cybersecurity Imperative
In the rapidly evolving landscape of cybersecurity, the rise of Large Language Models (LLMs) like…

Kubernetes Security: A Thorough Guide for Safeguarding Your Cloud-Native Workloads
Kubernetes, the widely-adopted open-source platform for managing containerized applications, has gained immense popularity for its…

Unveiling the Most Common AWS Security Misconfigurations: A Comprehensive Guide
Amazon Web Services (AWS) is a leading player in the arena of cloud computing, serving…