DEV Community

Avi Kapoor profile picture

Avi Kapoor

NodeJs and Golang Lover

Education

University of California, Berkeley

Four Year Club
Writing Debut
Three Year Club
Two Year Club
One Year Club
Hacktoberfest 2020
4 Week Writing Streak
Perplexity AI’s Deep Research Tool: How to Access and Use It for Free

Perplexity AI’s Deep Research Tool: How to Access and Use It for Free

Comments
2 min read
How Educational Institutions Are Pioneering Passwordless Authentication

How Educational Institutions Are Pioneering Passwordless Authentication

Comments
7 min read
Elon Musk Announces Grok 3 Chatbot Launch Date, Promises ‘Smartest AI on Earth’

Elon Musk Announces Grok 3 Chatbot Launch Date, Promises ‘Smartest AI on Earth’

Comments
2 min read
Detecting AI Slope / AI-Generated Images: Tips and Tools for Identifying Deepfakes

Detecting AI Slope / AI-Generated Images: Tips and Tools for Identifying Deepfakes

Comments
3 min read
Top 10 CIAM and Passwordless Solutions: Insights from the Community

Top 10 CIAM and Passwordless Solutions: Insights from the Community

Comments
7 min read
AI’s Double-Edged Sword: Bolstering Passwordless Security While Battling Smarter Threats

AI’s Double-Edged Sword: Bolstering Passwordless Security While Battling Smarter Threats

Comments
6 min read
Major Data Breaches: OmniGPT and DeepSeek Expose Millions of User Messages and Sensitive Information

Major Data Breaches: OmniGPT and DeepSeek Expose Millions of User Messages and Sensitive Information

Comments
2 min read
xAI Engineer Resigns After Being Pressured to Delete Tweet on Grok 3 AI Ranking

xAI Engineer Resigns After Being Pressured to Delete Tweet on Grok 3 AI Ranking

Comments
2 min read
The Comprehensive Guide to Becoming an LLM Engineer by 2025

The Comprehensive Guide to Becoming an LLM Engineer by 2025

Comments
2 min read
iOS 18.3.1 Update: Critical Fix for Actively Exploited Vulnerability

iOS 18.3.1 Update: Critical Fix for Actively Exploited Vulnerability

Comments
2 min read
OLTP, OLAP, and Modern Data Architecture Patterns

OLTP, OLAP, and Modern Data Architecture Patterns

Comments
2 min read
OpenAI's Human-Created Super Bowl Commercial: A Positive Perspective on AI

OpenAI's Human-Created Super Bowl Commercial: A Positive Perspective on AI

Comments
3 min read
Comparing AI : DeepSeek, ChatGPT, and Grok, Gemini, Meta AI

Comparing AI : DeepSeek, ChatGPT, and Grok, Gemini, Meta AI

Comments
3 min read
The Impact of Google's JavaScript SERPs and AI Search on eCommerce Businesses

The Impact of Google's JavaScript SERPs and AI Search on eCommerce Businesses

Comments
4 min read
UEFI Secure Boot: Understanding Its Functionality and Implementation

UEFI Secure Boot: Understanding Its Functionality and Implementation

Comments
3 min read
Secure JWT Token Management in Browser-Based Apps: A Practical Guide for Senior Engineers

Secure JWT Token Management in Browser-Based Apps: A Practical Guide for Senior Engineers

Comments
6 min read
🚀 Implement Passwordless Auth with MojoAuth in 10 Minutes (Yes, Really!)

🚀 Implement Passwordless Auth with MojoAuth in 10 Minutes (Yes, Really!)

Comments
2 min read
Comprehensive Guide to Passwordless Authentication Solutions (2025)

Comprehensive Guide to Passwordless Authentication Solutions (2025)

Comments
3 min read
Lightpanda: A Headless Browser Optimized for AI and Automation

Lightpanda: A Headless Browser Optimized for AI and Automation

Comments
3 min read
DeepSeek AI Database Breach: Over One Million Sensitive Records Exposed

DeepSeek AI Database Breach: Over One Million Sensitive Records Exposed

Comments
3 min read
Scaling Authentication Systems: Startup Agility vs Enterprise Demands

Scaling Authentication Systems: Startup Agility vs Enterprise Demands

Comments
3 min read
Introducing JavaScript Temporal: Exciting New Features Ahead

Introducing JavaScript Temporal: Exciting New Features Ahead

Comments
3 min read
Identity-Security Predictions and Digital Verification Trends for 2025

Identity-Security Predictions and Digital Verification Trends for 2025

Comments
2 min read
How AI and Biometric Authentication Secure Your Digital World

How AI and Biometric Authentication Secure Your Digital World

Comments
3 min read
Passkeys: Navigating the Future of Authentication with Usability Challenges

Passkeys: Navigating the Future of Authentication with Usability Challenges

Comments
3 min read
DeepSeek: From Tech Startup to Target of Malware Attacks and AI Vulnerabilities

DeepSeek: From Tech Startup to Target of Malware Attacks and AI Vulnerabilities

Comments
2 min read
Critical GitHub Vulnerability Exposes User Credentials Through Malicious Repositories

Critical GitHub Vulnerability Exposes User Credentials Through Malicious Repositories

Comments
2 min read
The Hidden Cost of Passwords: Why Modern Businesses Need a Better Solution

The Hidden Cost of Passwords: Why Modern Businesses Need a Better Solution

Comments
4 min read
Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

Comments
3 min read
GhostGPT: Cybercrime AI Tool Overview

GhostGPT: Cybercrime AI Tool Overview

Comments
2 min read
Mandatory MFA and Biometrics Make Headway in Middle East and Africa

Mandatory MFA and Biometrics Make Headway in Middle East and Africa

Comments
2 min read
The Evolution of Password Management: An AI-Driven Future

The Evolution of Password Management: An AI-Driven Future

Comments
12 min read
DeepSeek-V3: A New Milestone in Language Modeling

DeepSeek-V3: A New Milestone in Language Modeling

Comments
2 min read
Passwordless and Decentralized Identity: A New Era of Secure User Control

Passwordless and Decentralized Identity: A New Era of Secure User Control

Comments
4 min read
The Impact of AI on Authentication

The Impact of AI on Authentication

Comments
3 min read
The Future of Authentication: A Deep Dive into Passwordless Security

The Future of Authentication: A Deep Dive into Passwordless Security

Comments
3 min read
Securing Microsoft Active Directory: A Guide for Modern Identity Management

Securing Microsoft Active Directory: A Guide for Modern Identity Management

Comments
2 min read
Implementing Passkeys in PHP: A Complete Guide to Password-Free Authentication

Implementing Passkeys in PHP: A Complete Guide to Password-Free Authentication

Comments
3 min read
A Comprehensive Guide to REST API Authentication Methods

A Comprehensive Guide to REST API Authentication Methods

Comments
3 min read
The Future of Mobile Authentication: Evolving Technologies and Best Practices

The Future of Mobile Authentication: Evolving Technologies and Best Practices

Comments
3 min read
What is API Security and Why is It Important?

What is API Security and Why is It Important?

Comments
6 min read
Understanding JWT and OpenID Connect for Secure Authentication and Authorization

Understanding JWT and OpenID Connect for Secure Authentication and Authorization

Comments
6 min read
Understanding API Security: Essential Tips & Threats for Protecting Your Data

Understanding API Security: Essential Tips & Threats for Protecting Your Data

Comments
13 min read
Top IAM Platforms for Secure Access | MojoAuth

Top IAM Platforms for Secure Access | MojoAuth

Comments
10 min read
Master Web App Security: A Simple Guide for Beginners

Master Web App Security: A Simple Guide for Beginners

Comments
9 min read
Understanding Access Control in Cybersecurity | MojoAuth Guide

Understanding Access Control in Cybersecurity | MojoAuth Guide

Comments
11 min read
Top 12 Identity Management Solutions 2024 - Best Picks

Top 12 Identity Management Solutions 2024 - Best Picks

Comments
10 min read
12 Best Practices to Secure Your REST API

12 Best Practices to Secure Your REST API

Comments
11 min read
Cloud Security Compliance: Top Standards & Best Practices

Cloud Security Compliance: Top Standards & Best Practices

Comments
12 min read
Discover CIAM Benefits for Security

Discover CIAM Benefits for Security

Comments
14 min read
Your 2024 Bio Glow-Up: Stand Out on LinkedIn, Twitter, and Beyond!

Your 2024 Bio Glow-Up: Stand Out on LinkedIn, Twitter, and Beyond!

Comments
3 min read
Understanding EOL Characters: Line Termination in Computing

Understanding EOL Characters: Line Termination in Computing

Comments
3 min read
Secure iOS Login & Registration with Swift & UIKit Guide

Secure iOS Login & Registration with Swift & UIKit Guide

Comments
3 min read
Account Takeover: The Silent Threat to Businesses and Consumers

Account Takeover: The Silent Threat to Businesses and Consumers

1
Comments
7 min read
Understanding Bitwise XOR: A Deep Dive

Understanding Bitwise XOR: A Deep Dive

Comments
3 min read
Passwordless Authentication Streamlines Cyber Insurance and Bolsters Security

Passwordless Authentication Streamlines Cyber Insurance and Bolsters Security

Comments
5 min read
Frictionless Authentication for Devoted Fans: How MojoAuth Empowers Customer-Centric Brands

Frictionless Authentication for Devoted Fans: How MojoAuth Empowers Customer-Centric Brands

Comments
5 min read
The Future of Login is Here: A Frictionless and Secure Authentication Flow for Everyone

The Future of Login is Here: A Frictionless and Secure Authentication Flow for Everyone

Comments
2 min read
Powering Seamless Growth: MojoAuth's Role in Supercharging Authentication for Scaling Companies

Powering Seamless Growth: MojoAuth's Role in Supercharging Authentication for Scaling Companies

Comments
6 min read
MojoAuth: Leveling Up Security and User Experience for Social Media and Gaming Giants

MojoAuth: Leveling Up Security and User Experience for Social Media and Gaming Giants

Comments
6 min read
loading...