Cybersecurity
Related:
Show all related links >>
sockpuppet.org
I Went To SQL Injection Court — Quarrelsome (https://sockpuppet.org/blog/2025/02/09/fixing-illinois-foia/)
infosecforactivists.org
Infosec 101 for Activists | Infosec for Activists (https://infosecforactivists.org/)
utcc.utoronto.ca
Chris's Wiki ,: blog/spam/WellPreparedPhishSpammer (https://utcc.utoronto.ca/~cks/space/blog/spam/WellPreparedPhishSpammer)
delroth.net
delroth's homepage - One weird trick to get the whole planet to send abuse complaints to your best friend(s) (https://delroth.net/posts/spoofed-mass-scan-abuse/)
www.bleepingcomputer.com
Internet Archive breached again through stolen access tokens (https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/)
www.welivesecurity.com
Mind the (air) gap, GoldenJackal gooses government guardrails (https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/)
www.theregister.com
'I break into buildings and pretend to be the bad guy' • The Register (https://www.theregister.com/2024/09/29/interview_with_a_social_engineering/)
tommihovi.com
Demystifying cookies and tokens – Tommi Hovi | The Security blog (https://tommihovi.com/2024/05/demystifying-cookies-and-tokens/)
ludic.mataroa.blog
I Will Fucking Piledrive You If You Mention AI Again — Ludicity (https://ludic.mataroa.blog/blog/i-will-fucking-piledrive-you-if-you-mention-ai-again/)
ayende.com
Building a serverless secured dead drop - Ayende @ Rahien (https://ayende.com/blog/201153-B/building-a-serverless-secured-dead-drop)
samcurry.net
Hacking Millions of Modems (and Investigating Who Hacked My Modem) (https://samcurry.net/hacking-millions-of-modems)
www.hezmatt.org
Brane Dump, How I Tripped Over the Debian Weak Keys Vulnerability (https://www.hezmatt.org/~mpalmer/blog/2024/04/09/how-i-tripped-over-the-debian-weak-keys-vuln.html)
research.swtch.com
research!rsc, Timeline of the xz open source attack (https://research.swtch.com/xz-timeline)
www.openwall.com
oss-security - backdoor in upstream xz/liblzma leading to ssh server compromise (https://www.openwall.com/lists/oss-security/2024/03/29/4)
owasp.org
OWASP Data Breach Notification | OWASP Foundation (https://owasp.org/blog/2024/03/29/OWASP-data-breach-notification)
blog.wesleyac.com
Wesley Aptekar-Cassels | Reasons to avoid Javascript CDNs (https://blog.wesleyac.com/posts/why-not-javascript-cdn)
github.com
MatrixTM/MHDDoS, Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods (https://github.com/MatrixTM/MHDDoS)
env.fail
900 Sites, 125 million accounts, 1 vulnerability - env.fail (https://env.fail/posts/firewreck-1/)
vin01.github.io
You can not simply publicly access private secure links, can you? | Vin01’s Blog (https://vin01.github.io/piptagole/security-tools/soar/urlscan/hybrid-analysis/data-leaks/urlscan.io/cloudflare-radar%22/2024/03/07/url-database-leaks-private-urls.html)
www.canva.dev
Fonts are still a Helvetica of a Problem - Canva Engineering Blog (https://www.canva.dev/blog/engineering/fonts-are-still-a-helvetica-of-a-problem/)
owasp.org
OWASP Top 10 for Large Language Model Applications | OWASP Foundation (https://owasp.org/www-project-top-10-for-large-language-model-applications/)
github.com
praetorian-inc/noseyparker, Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history. (https://github.com/praetorian-inc/noseyparker/)
arcanican.is
Remote User Impersonation and Takeover via Cache Poisoning (https://arcanican.is/excerpts/cve-2024-23832/discovery.htm)
spectrum.ieee.org
Why Bloat Is Still Software’s Biggest Vulnerability - IEEE Spectrum (https://spectrum.ieee.org/lean-software-development)
maia.crimew.gay
#FuckStalkerware pt. 4 - the truth come out: does TheTruthSpy is secure (https://maia.crimew.gay/posts/fuckstalkerware-4/)
glitchbyte.io
Rust wont save us, but its ideas will • Glitchbyte (https://glitchbyte.io/posts/rust-wont-save-us/)
www.malwarebytes.com
How to tell if your toothbrush is being used in a DDoS attack | Malwarebytes (https://www.malwarebytes.com/blog/awareness/2024/02/how-to-tell-if-your-toothbrush-is-being-used-in-a-ddos-attack)
snyk.io
Leaky Vessels, Docker and runc Container Breakout Vulnerabilities - January 2024 | Snyk (https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/)
github.com
jtesta/ssh-audit, SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc) (https://github.com/jtesta/ssh-audit)
wapiti-scanner.github.io
Wapiti, a Free and Open-Source web-application vulnerability scanner in Python (https://wapiti-scanner.github.io/)
Un scanner pour les vulnérabilités des applications web.