matrixm0x1how I found a critical bug using response manipulationHello everyone! It’s been a while since my last writeup. I’ve been away from bug bounty hunting, but in this writeup, I’ll share how I…1d ago
Tiexin Guoin4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262
Andrew BloomanStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 284Jul 284
RohitashokgowdHow to improve SOC operations?A Security Operations Center (SOC) plays a crucial role in cybersecurity, offering comprehensive visibility across the entire…17h ago17h ago
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 20107Jul 20107
matrixm0x1how I found a critical bug using response manipulationHello everyone! It’s been a while since my last writeup. I’ve been away from bug bounty hunting, but in this writeup, I’ll share how I…1d ago
Tiexin Guoin4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262
Andrew BloomanStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 284
RohitashokgowdHow to improve SOC operations?A Security Operations Center (SOC) plays a crucial role in cybersecurity, offering comprehensive visibility across the entire…17h ago
Jan KammerathInside The Outages: A Dangerous Null Pointer Exception Deployed On FridayThe world went into shock when cyber security firm “Crowdstrike”, a provider of endpoint protection software, released an update on Friday…Jul 20107
ByteCookinLevel Up Coding15 Ways To Harden the Security of Your Linux SystemLinux is a free and open-source Unix-like operating system. Known for its security, efficiency, and stability, Linux servers are widely…Jul 5
Enrique DansinEnrique DansApple’s Find My feature is not “creepy”; defending thieves isTim Sweeney, the eccentric founder and CEO of Epic Games, a long-standing critic of Apple, has found another way to attack the company in a…19h ago1
The Useful TechinMac O’ClockWhy Apple’s Private Cloud Is The Best AI Implementation YetApple’s Is Going To Permanently Change Our Perception About AIJun 308