From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
๐SQL Injection
Flag this post
HTB: Dump
0xdf.gitlab.ioยท16h
๐ฆWireshark
Flag this post
CORS and Same-Origin Policy Deep Dive
๐TLS/SSL
Flag this post
Cache Poisoning: Making Your CDN Serve Malicious Content to Everyone ๐๏ธ
๐SQL Injection
Flag this post
Cybercriminals Behind โUniverse Browserโ: A Fake Privacy App Spying on Users and Linked to Chinese Crime Syndicates
blogger.comยท16h
๐Cybersecurity
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.orgยท1d
๐Cybersecurity
Flag this post
[TUI] Ricing the original Rogue
๐TLS/SSL
Flag this post
Potential Domain Changes
floral.lgbtยท2h
๐DNS
Flag this post
The Constrained Application Protocol (CoAP)
๐TLS/SSL
Flag this post
Hackers love when you reuse passwordsโhereโs why itโs so dangerous
howtogeek.comยท1d
๐Cybersecurity
Flag this post
Tycoon 2FA Phishing Kit Analysis
cybereason.comยท1d
๐TLS/SSL
Flag this post
US Govt Whistleblower Guide
lesswrong.comยท19h
๐Cybersecurity
Flag this post
HTTP desync attacks: request smuggling reborn
๐TLS/SSL
Flag this post
Build your own GPG in Rust
๐TLS/SSL
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.comยท1d
๐SQL Injection
Flag this post
Credentials Evidence or Simulate
๐Cryptography
Flag this post
Loading...Loading more...