kemanon's Top FindsLoading...
Best practice - when destroying a session, should the session cookie simply be deleted or proactively expired?
cheatsheetseries.owasp.org·1d·
Discuss: r/webdev
💉SQL Injection
Flag this post
Codacy Provides Free AI- Risk Assessment
i-programmer.info·4h
🎯Penetration Testing
Flag this post
“Sneaky” new Android malware takes over your phone, hiding in fake news and ID apps
malwarebytes.com·1d
🦠Malware Analysis
Flag this post
Stop vibe coding your unit tests
andy-gallagher.com·2h·
Discuss: Hacker News
💉SQL Injection
Flag this post
<![CDATA[ Announcing DoltLab on Podman ]]>
dolthub.com·19h
🐳Docker
Flag this post
Playing Around with ARM Assembly
blog.nobaralabs.com·1d·
Discuss: Hacker News
🐧Linux
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.net·2d·
Discuss: Hacker News
🎯Penetration Testing
Flag this post
A C example with objects and a arena for allocations, what do you think?
reddit.com·7h·
💻Computer Science
Flag this post
Homelab dashboard
github.com·17h·
Discuss: r/homelab
🐳Docker
Flag this post
4 awesome (and practical) things you can do with a terminal on Android
howtogeek.com·2h
🔑SSH
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.sc·2h
🦠Malware Analysis
Flag this post
How to: Automate Your Next.js Docker App with Render and GitHub Actions
dev.to·2d·
Discuss: DEV
🐳Docker
Flag this post
Operational Technology Security Poses Inherent Risks for Manufacturers
darkreading.com·4h
🔐Cybersecurity
Flag this post
How I Prepared for a Data Science Interview at a Large Tech Company
kdnuggets.com·2h
🐍Python
Flag this post
DAFU🦉 Infrastructure Revolution: Docker, CLI, and Enterprise Automation Are Here! 🚀
dev.to·2d·
Discuss: DEV
🐳Docker
Flag this post
AI Browsers and Prompt Injection: The New Cybersecurity Frontier
dev.to·17h·
Discuss: DEV
🎯Penetration Testing
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Introducing Spira - Making a Shell #0
github.com·1d·
Discuss: DEV
🐧Linux
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.com·2d
🦠Malware Analysis
Flag this post
มาลองสร้างระบบ Failover แบบ Multi-Region กับ Amazon EKS (แบบ Step-by-step)
dev.to·14h·
Discuss: DEV
🔒TLS/SSL
Flag this post