Bio

M.S. in Computer Science, Georgia Tech.
B.S. in Software Engineering, Drexel University

Ax Sharma is a Security Researcher, Threat Intel Analyst, and Tech Reporter who holds a passion for perpetual learning. In his spare time, he loves exploiting vulnerabilities, ethically, and educating a wide range of audiences via blogging and vlogging. He’s an active community member of the OWASP Foundation and the British Association of Journalists (BAJ).

Ax’s expertise lies in malware analysis, vulnerability research, threat intelligence analysis, and web app security. Through responsible disclosure, he has previously exposed serious bugs and security vulnerabilities affecting national & global organisations like HM GovernmentYodel, U.S. DHS, P.F. Chang’s, Planet Fitness, Comcast/Arris, Ellucian, and the popular restaurant chain, Buca di Beppo.

In early 2018, Ax helped prevent a data breach at Georgia Tech by going public with a serious flaw that was left unpatched for over a year.

To consult Ax for your next big security project or for media source requests, drop him a note here.

Ax’s hobbies include working out, reading, playing piano and developing innovative, upcoming web projects.

  • 6 ways hackers hide their tracks6 ways hackers hide their tracks
    CISOs have an array of ever-improving tools to help spot and stop malicious activity: network monitoring tools, virus scanners, software composition analysis (SCA) tools, digital forensics and incident response (DFIR) solutions, and more.To read this article in full, please click here(Insider Story) Read more »
  • Software composition analysis explained, and how it identifies open-source software risksSoftware composition analysis explained, and how it identifies open-source software risks
    Software composition analysis definition Software composition analysis (SCA) refers to obtaining insight into what open-source components and dependencies are being used in your application, and how—all in an automated fashion. This process serves the purpose of assessing the security of these components and any potential risks or licensing conflicts brought… Read more »
  • SSRF attacks explained and how to defend against themSSRF attacks explained and how to defend against them
    SSRF attack definition Server-side request forgery (SSRF) attacks consist of an attacker tricking the server into making an unauthorized request. The name itself implies that a request that should have otherwise been made by the server has been forged by the attacker.SSRF attacks are far more dangerous than cross-site request… Read more »
Loading RSS Feed