Not long ago, I found myself pair programming in a way I never expected. As a former business analyst sitting beside developers, and also a developer sitting alongside developers, I was used to articulating requirements while my human partner typed away. But this time, my partner wasn’t human at all; it was an AI coding assistant. Guiding ChatGPT through building a feature, I had a flashback to Extreme Programming (XP) sessions from years past. The rhythm felt familiar: a “driver” writing code (the AI) and a “navigator” guiding the problem-solving (me). In that moment, I realized that using AI to
Author: Dino Cajic
I’ve led software engineering teams through many hype cycles, from cloud computing to mobile apps. But 2025 feels different . For the first time, I find myself working alongside autonomous AI “agents” that not long ago were science fiction. In meetings with fellow tech leaders, one theme keeps emerging: AI agents are everywhere. Tech headlines are even calling 2025 the year of the AI agent . As a CTO and software developer (I still love to write code myself, not as much as I used to), I’ve watched generative AI evolve from a clever chatbot into a workforce of problem-solvers
Several years ago, I strapped on an OpenBCI EEG headset in my home office, fueled by one burning question: Could I control a machine with my thoughts? At the time, brain-computer interface (BCI) tech felt like sci-fi, but I was too curious not to try. What started as a hobby project became one of the most fascinating experiments I’ve ever done, and it’s now pulling me back in, thanks to today’s leaps in AI, hardware, and industry interest in BCIs. A DIY Brain-Computer Interface Experiment (Years Ago) I wasn’t a neuroscientist or a cyborg tinkerer, just a developer with a
Block rogue queries before they bite A SQL (Structured Query Language) injection attack occurs when an attacker injects a piece of SQL script in order to manipulate the SQL script running on a database-driven web-application in an attempt to access/modify/delete something within the database. It can even execute certain administrative scripts. The SQL injection attack is one of the most common attacks out there. Companies are getting hit by these attacks constantly. You’ve probably seen stories about user information getting posted on sites like PasteBin. Business Impact of a SQL Injection Attack The business impact can range widely depending on
Cut out the silent middle-man The man-in-the-middle attack is an appropriate term for this type of attack. The network traffic is routed through the attackers machine and the hacker can see unencrypted data as it passes through. How does man-in-the-middle attack work? The Man-in-the-Middle attack works by having the attacker inject their machine between two devices that are communicating with each other. Those two devices will send all of their packets to the attacker’s machine and the attacker will usually route the communication to the destination machine after sniffing out the contents of those packets. ARP (Address Resolution Protocol) Poisoning
Protect the internet’s phone book DNS (Domain Name System) servers are domain servers that take the domain names that we entered and provide us with IP addresses. Modifying the DNS record could send someone to an IP address that they were not expecting. It’s less common now but it still does happen. Why is DNS poisoning so dangerous? The user is not clicking on a link that takes them to a separate website. The victim types in a correct domain name, like medium.com, and is instead directed to the attacker’s website. The attacker can then take whatever information they want, as
Stop script injections cold Cross Site Scripting is a common vulnerability in web applications. It’s estimated that 60% of all websites are susceptible to this attack. What is cross site scripting (XSS)? Cross Site Scripting, or XSS, is a technique for injecting malicious code into another website. Persistent Cross Site Scripting Let’s say that an attacker is able to send a piece of JavaScript code through a form on a legitimate website that stores the malicious code within the database of the website. That JavaScript code can then wreak havoc on other users since that JavaScript code is then returned to the
Know the enemy within Malware is a type of malicious software that can infect your computer and infiltrate all of your data. It’s often used to steal personal information or spread other types of malware. The best way to protect yourself from malware is to keep up-to-date with security patches and always use antivirus software on your device. It’s estimated that the total cost of malware related cybercrime is at $6 trillion. Yes, trillion with a T. Read More. What is Malware? Malware is a type of software that can be used to damage or disable computers and computer systems. Malware
Don’t take the bait—spot phishing fast If you use email, you most likely heard about Phishing attacks. Although it sounds just like Fishing, it’s not as relaxing. If you’ve been phished, you’re going to have a bad day. If you caught a fish, you’re going to be smiling. Why call it phishing? The idea is that the hacker sends a baited email to the target user and hopes that the target takes the bait. Just like the bait in fishing is supposed to resemble something that the fish wants, the bait in phishing is masked as something that the user
When traffic turns into a weapon A Denial of Service (DoS) attack is when an attacker attempts to make a site unavailable to users by sending so much traffic to it that the site cannot respond. The idea is to disrupt the normal operations of a server or network with a cyber attack on that server or network. This cyber attack is coming from one source, such as the attackers computer. There are different types of DoS attacks, including a Distributed Denial of Service (DDoS) attack, which uses multiple sources to attack a network or server. Recently, nearly all DoS