<?xml version="1.0" encoding="UTF-8"?>
<rss
    version="2.0"
    xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link
            type="application/rss+xml"
            href="https://www.iamsharan.com/feed/posts"
            rel="self"
        />
        <title><![CDATA[Posts feed]]></title>
        <link><![CDATA[https://www.iamsharan.com/feed/posts]]></link>
                <description><![CDATA[Latest posts from Application Security Engineer]]></description>
        <language>en-US</language>
        <pubDate>2025-04-21T12:17:11+00:00</pubDate>

                    <item>
                <title><![CDATA[Subdomain Takeovers Exploits, Blind Spots, and  Defend Your Digital Turf]]></title>
                <link>https://www.iamsharan.com/subdomain-takeovers-part-2</link>
                <description><![CDATA[In our previous post, we traced the decade-long evolution of subdomain takeovers from a niche issue to a widespread security risk with significant financial and reputational consequences. Now, we delve deeper into how attackers weaponize these vulnerabilities, why this threat is often underestimated despite its impact, and critically, what organizations can do to monitor for and mitigate this risk]]></description>
                                    <author><![CDATA[Sharanabasava MS <techfolksbanglore@gmail.com>]]></author>
                                <guid>https://www.iamsharan.com/subdomain-takeovers-part-2</guid>
                <pubDate>Mon, 21 Apr 2025 12:16:46 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://www.iamsharan.com/storage/introduction-visual-selection1.png"
                    length="374740"
                />
                                    <category>Application Security</category>
                            </item>
                    <item>
                <title><![CDATA[Subdomain Takeovers: A Decade of Escalating Risk (2015-2025)]]></title>
                <link>https://www.iamsharan.com/subdomain-takeovers-part-1</link>
                <description><![CDATA[Subdomain takeover is like finding an abandoned house with the keys still in the door—you didn’t own it, but now you can move in. It happens when a subdomain of a website is left pointing to a service that’s no longer active, allowing attackers to claim it and use it for malicious purposes like phishing, spreading malware, or impersonating the original site.]]></description>
                                    <author><![CDATA[Sharanabasava MS <techfolksbanglore@gmail.com>]]></author>
                                <guid>https://www.iamsharan.com/subdomain-takeovers-part-1</guid>
                <pubDate>Mon, 21 Apr 2025 12:16:58 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://www.iamsharan.com/storage/introduction-visual-selection3.png"
                    length="145292"
                />
                                    <category>Application Security</category>
                            </item>
                    <item>
                <title><![CDATA[Implementing “Start Left”: Practical Strategies for Early Security]]></title>
                <link>https://www.iamsharan.com/implementing-start-left</link>
                <description><![CDATA[Start Left is a proactive approach to software security, embedding secure design from a project's earliest stages. By systematically integrating threat modeling, developer training, and architecture reviews, it addresses vulnerabilities before they materialize. This culture shift ensures safer code, reduces technical debt, and fosters resilient applications that truly meet modern security demands.]]></description>
                                    <author><![CDATA[Sharanabasava MS <techfolksbanglore@gmail.com>]]></author>
                                <guid>https://www.iamsharan.com/implementing-start-left</guid>
                <pubDate>Mon, 21 Apr 2025 12:17:03 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://www.iamsharan.com/storage/chatgpt-image-apr-6-2025-10-14-00-pm.png"
                    length="2069030"
                />
                                    <category>Application Security</category>
                            </item>
                    <item>
                <title><![CDATA[From Shift Left to Start Left: What It Means to “Start” with Security]]></title>
                <link>https://www.iamsharan.com/from-shift-left-to-start-left</link>
                <description><![CDATA[In our <a href="https://iamsharan.com/the-shift-left-mirage">last discussion</a>, we uncovered Shift Left pain points: developer burnout, overwhelmed DevOps, noisy tools, and security-engineering rifts. Moving scans earlier isn't enough. To truly secure software, we need to go beyond Shift Left and Start Left with intent.]]></description>
                                    <author><![CDATA[Sharanabasava MS <techfolksbanglore@gmail.com>]]></author>
                                <guid>https://www.iamsharan.com/from-shift-left-to-start-left</guid>
                <pubDate>Sat, 05 Apr 2025 09:30:52 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://www.iamsharan.com/storage/chatgpt-image-apr-5-2025-02-28-40-pm.png"
                    length="2554102"
                />
                                    <category>Application Security</category>
                            </item>
                    <item>
                <title><![CDATA[The Shift Left Mirage: Why Early Security Isn't Always a Silver Bullet]]></title>
                <link>https://www.iamsharan.com/the-shift-left-mirage</link>
                <description><![CDATA["Shift Left" promised to revolutionize software security by integrating security tasks early into the development cycle, ideally catching vulnerabilities long before deployment. Yet, despite high hopes, many teams find themselves facing significant roadblocks. Let’s dive into why "shifting left" often stumbles, highlighting the common pitfalls and examining why some organizations struggles more.]]></description>
                                    <author><![CDATA[Sharanabasava MS <techfolksbanglore@gmail.com>]]></author>
                                <guid>https://www.iamsharan.com/the-shift-left-mirage</guid>
                <pubDate>Mon, 21 Apr 2025 12:17:11 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://www.iamsharan.com/storage/chatgpt-image-apr-3-2025-10-49-11-pm.png"
                    length="2349195"
                />
                                    <category>Application Security</category>
                            </item>
            </channel>
</rss>
