Back

Hey everyone, We’re building a tool that automates repetitive manual tasks. Instead of performing the same actions every day, just upload a video of yourself doing the task once, and the product will handle the rest. If you frequently update CRM re

See More

Dhruv Bhardwaj

Founder • 2m

We are focusing on security and privacy from the start only, features like intelligent guardrailing etc to safeguard from threats like prompt injection

0 replies

More like this

Recommendations from Medial

Image Description
Image Description

Devak K

Hey I am on Medial • 3m

Common Network Security Threats | Digitdefence Explore common network security threats like malware, phishing, and ransomware, and learn how to protect your systems from these malicious attacks. https://digitdefence.com/cyber-security-services/netwo

See More
2 replies3 likes

Vansh Khandelwal

Full Stack Web Devel... • 5m

Security testing ensures that applications are free from vulnerabilities like SQL Injection, XSS, CSRF, and IDOR. SQL Injection occurs when unsanitized inputs allow attackers to manipulate database queries. This can be mitigated by using parameterize

See More
0 replies2 likes
Image Description

Vasvi Seth

Cyber Security Stude... • 1y

Protecting organizational assets is paramount in today's digital landscape. To ensure comprehensive asset protection, organizations must address multiple potential threats: 1. External Risk: External threats, such as hackers and cybercriminals, pose

See More
1 replies4 likes
1

Sahil Alam

Web and App develope... • 5m

Build once, deploy everywhere – with a single app for mobile and web, offering top-tier security features like data encryption, secure authentication, and privacy protection ios and android......

0 replies2 likes
Image Description

Vamshi Yadav

 • 

SucSEED Ventures • 1m

Google DeepMind’s CaMeL: A Breakthrough in Stopping AI’s "Prompt Injection" Problem? For years, prompt injection attacks (where hidden instructions trick AI models into bypassing safeguards) have haunted developers. Despite countless fixes, no solut

See More
1 replies9 likes

Yashab alam

Founder ZehraSec • 10h

🚨 Did you know? Over 60% of cyberattacks originate from insider threats — whether intentional or accidental. That's exactly why we built ZehraSight 🔍 🛡️ ZehraSight is your AI-powered sentinel, designed to detect, analyze, and prevent insider thr

See More
0 replies3 likes

Vasvi Seth

Cyber Security Stude... • 1y

🔒 Protecting Sensitive Personally Identifiable Information (SPII) is paramount in today's digital landscape. SPII encompasses data that requires even stricter handling guidelines to safeguard individuals' privacy and security. As we navigate the co

See More
0 replies5 likes

yamini k

Hey I am on Medial • 3m

Cybersecurity Services - DigitDefence Protect Your Business with Expert Cybersecurity Services Cyber threats are evolving—don't let your business be the next target. Our comprehensive cybersecurity solutions safeguard your data, systems, and reputat

See More
0 replies1 like
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:... • 4m

IoT Hacking Hardware Devices – Understanding Security Risks IoT devices are everywhere—from smart homes to industrial automation. But how secure are they? IoT hacking hardware plays a crucial role in security research, penetration testing, and ethic

See More
3 replies2 likes
Image Description

Kaustubh Jaiswal

 • 

HCLTech • 1y

WhatsApp could greatly enhance user privacy and security by implementing a feature allowing video calls to be accepted with the camera turned off. 👤 Unlike other platforms like Google Meet, Zoom, and Microsoft Teams, WhatsApp currently lacks this o

See More
3 replies6 likes

Download the medial app to read full posts, comements and news.