Learning

Enhancing Octomind with MCP Integration
Despite having built a solid foundation with Octomind that helped in our test-maintenance work and enabled manual testers to create..

Enhancing Octomind with MCP Integration
Despite having built a solid foundation with Octomind that helped in our test-maintenance work and enabled manual testers to create..

MeetC2 a.k.a Meeting C2
Modern adversaries increasingly hide command-and-control (C2) traffic inside cloud services. We built this proof of concept...

MeetC2 a.k.a Meeting C2
Modern adversaries increasingly hide command-and-control (C2) traffic inside cloud services. We built this proof of concept...

Brewing Trouble — Dissecting a macOS Malware Campaign
How a single alert led our team down a rabbit hole of sophisticated deception —and what we learned about the evolving threat landscape

Brewing Trouble — Dissecting a macOS Malware Campaign
How a single alert led our team down a rabbit hole of sophisticated deception —and what we learned about the evolving threat landscape

5 AI Agents. 1 Week. All Built By a Cross-Functional Security Team
We Built 5 Al Agents in 1 Week —Here's What We Learned About Code, Chaos, and Teamwork

5 AI Agents. 1 Week. All Built By a Cross-Functional Security Team
We Built 5 Al Agents in 1 Week —Here's What We Learned About Code, Chaos, and Teamwork
.webp)
SecArchBot: AI-powered Zero Trust architecture analysis
SecArchBot, developed by Deriv Security Team, automates Zero Trust Architecture analysis in Slack. Secured integration systems with AI.
.webp)
SecArchBot: AI-powered Zero Trust architecture analysis
SecArchBot, developed by Deriv Security Team, automates Zero Trust Architecture analysis in Slack. Secured integration systems with AI.

Smuggled in plain sight: SVG attacks, malware evasion, and the rise of SmuggleShield
Dhiraj Mishra- Manager offensive security deriv- research paper on art of malware Smuggling. SVG-based attack techniques

Smuggled in plain sight: SVG attacks, malware evasion, and the rise of SmuggleShield
Dhiraj Mishra- Manager offensive security deriv- research paper on art of malware Smuggling. SVG-based attack techniques
.webp)
Securing GitHub Actions: Identifying, mitigating, and detecting vulnerabilities in CI/CD workflows
Essential GitHub Actions security best practices to defend CI/CD pipelines. CI/CD tool that automates testing, building, and deployment applications
.webp)
Securing GitHub Actions: Identifying, mitigating, and detecting vulnerabilities in CI/CD workflows
Essential GitHub Actions security best practices to defend CI/CD pipelines. CI/CD tool that automates testing, building, and deployment applications

Low-code AI tools to build the intelligent architecture blueprint
How can low-code AI tools improve your system development? Learn how they helped us build intelligent, adaptable components with ease.

Low-code AI tools to build the intelligent architecture blueprint
How can low-code AI tools improve your system development? Learn how they helped us build intelligent, adaptable components with ease.

Engineering the future: AI innovation at Deriv
At Deriv, we're riding the wave of AI innovations. Read how we're integrating AI to automate operations and drive smarter financial outcomes.

Engineering the future: AI innovation at Deriv
At Deriv, we're riding the wave of AI innovations. Read how we're integrating AI to automate operations and drive smarter financial outcomes.