From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
💉SQL Injection
Flag this post
HTB: Dump
0xdf.gitlab.io·10h
🦈Wireshark
Flag this post
Cybercriminals Behind “Universe Browser”: A Fake Privacy App Spying on Users and Linked to Chinese Crime Syndicates
blogger.com·10h
🔐Cybersecurity
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.org·1d
🔐Cybersecurity
Flag this post
Analysis of NGate malware campaign (NFC relay)
🔒TLS/SSL
Flag this post
The Constrained Application Protocol (CoAP)
🔒TLS/SSL
Flag this post
Hackers love when you reuse passwords—here’s why it’s so dangerous
howtogeek.com·21h
🔐Cybersecurity
Flag this post
Tycoon 2FA Phishing Kit Analysis
cybereason.com·1d
🔒TLS/SSL
Flag this post
US Govt Whistleblower Guide
lesswrong.com·12h
🔐Cybersecurity
Flag this post
HTTP desync attacks: request smuggling reborn
🔒TLS/SSL
Flag this post
Build your own GPG in Rust
🔒TLS/SSL
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.com·1d
💉SQL Injection
Flag this post
Credentials Evidence or Simulate
🔐Cryptography
Flag this post
Nodepass: Open-source TCP/UDP Tunneling Solution
linuxtoday.com·4h
🛣️BGP
Flag this post
Randomness Testing Guide
🎯Penetration Testing
Flag this post
Loading...Loading more...