// Posts tagged in
-
How we use Lakera Guard to secure our LLMs
// Sep 18, 2024 • Security
-
Implementing end-to-end encryption for Dropbox teams
// Jun 05, 2024 • Security
-
Bye Bye Bye...: Evolution of repeated token attacks on ChatGPT models
// Mar 19, 2024 • Machine Learning
-
Dont you (forget NLP): Prompt injection with control characters in ChatGPT
// Jul 19, 2023 • Machine Learning
-
Lessons learned: Using a cybersecurity vendor to check for malicious links
// May 09, 2023 • Security
-
How we handled a recent phishing incident that targeted Dropbox
// Nov 01, 2022 • Security
-
Defending against SSRF attacks (with help from our bug bounty program)
// Sep 20, 2022 • Security
-
PKCE: What and Why?
// Dec 04, 2020 • Developers
-
Dropbox bug bounty program has paid out over $1,000,000
// Feb 03, 2020 • Security
-
How Dropbox Security builds tools for threat detection and incident response
// Oct 16, 2019 • Security
-
Towards better vendor security assessments
// Mar 27, 2019 • Security
-
Courier: Dropbox migration to gRPC
// Jan 08, 2019 • Infrastructure
-
Offensive testing to make Dropbox (and the world) a safer place
// Nov 16, 2018 • Security
-
Live-hacking Dropbox @ H1-3120
// Sep 10, 2018 • Security
-
Introducing WebAuthn support for secure Dropbox sign in
// May 08, 2018 • Security
-
MacOS monitoring the open source way
// Apr 26, 2018 • Security
-
Protecting Security Researchers
// Mar 21, 2018 • Security
-
Security at scale: the Dropbox approach
// Feb 13, 2018 • Security
-
Preventing cross-site attacks using same-site cookies
// Mar 16, 2017 • Security
-
Meet Securitybot: Open Sourcing Automated Security at Scale
// Feb 22, 2017 • Security
-
How Dropbox securely stores your passwords
// Sep 21, 2016 • Security
-
[CSP] Third Party Integrations and Privilege Separation
// Sep 24, 2015 • Security
-
[CSP] The Unexpected Eval
// Sep 23, 2015 • Security
-
[CSP] Unsafe-inline and nonce deployment
// Sep 22, 2015 • Security
-
[CSP] On Reporting and Filtering
// Sep 21, 2015 • Security
-
Dropbox Bug Bounty Program: Best Practices
// Aug 31, 2015 • Security
-
zxcvbn: realistic password strength estimation
// Apr 10, 2012 • Security