The Sacrilegious Coder
๐Self-Documenting Code
Flag this post
How much cyber security do I need in 2025?
mashable.comยท4d
๐Hash Functions
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐ก๏ธParser Security
Flag this post
Python Certifi and Custom CAs
โ
Configuration Validation
Flag this post
Securing the Win: What Cybersecurity Can Learn From the Paddock
darkreading.comยท2d
๐ก๏ธSecurity Type Systems
Flag this post
Built Bittorrent in go
๐ธ๏ธP2P Protocols
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท21h
๐Rust Borrowing
Flag this post
What is masked email? This new spin on an old practice supercharges security
nordot.appยท1d
๐ก๏ธParser Security
Flag this post
Automated Regulatory Compliance Risk Assessment via Multi-Modal Knowledge Graph Fusion & Explainable AI
๐DataFrame Types
Flag this post
The Limits of Formal Security Models โ Dorothy E. Denning (1999)
๐ก๏ธSecurity Type Systems
Flag this post
Back to security basics: phishing
jamf.comยท2d
๐Hash Functions
Flag this post
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
cloud.google.comยท2d
๐ก๏ธParser Security
Flag this post
Understanding X's "About this Account" Feature: A Fact-Based Overview
kiledjian.comยท8h
๐ท๏ธMemory Tagging
Flag this post
OWASP Top 10 tackles supply chain risk
reversinglabs.comยท2d
๐ก๏ธSecurity Type Systems
Flag this post
How SaaS companies can achieve ISO 27001 certification and demonstrate a strong security posture
krdo.comยท2d
โ
Configuration Validation
Flag this post
Loading...Loading more...