The reverse tabnabbing vulnerability in HTML
techblog.topdesk.com·15h·
Discuss: Hacker News
🛠cybersecurity
Flag this post
A place to meet new people and connect in Bern
connectbern.ch·4h·
Discuss: Hacker News
compliance
Flag this post
Ask HN: I know how to build it, now I want to break it
news.ycombinator.com·1d·
Discuss: Hacker News
🛠cybersecurity
Flag this post
Why Data Centers Want James Bond–Style Security Consultants
theinformation.com·2d
🛠cybersecurity
Flag this post
Privacy Protection: Cover Your Tracks
rajhackingarticles.blogspot.com·4d·
🔒MLSecOps
Flag this post
College Football Playoff bracket prediction: Who's up for Texas vs. Texas Tech in Lubbock?
nytimes.com·13h
🛠cybersecurity
Flag this post
Making Hosted Control Planes possible with Talos
youtube.com·2d
🔒MLSecOps
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·2d
🛠cybersecurity
Flag this post
HYPER-ADVERTISER The Hyper Active advertiser: Marketing Hosting With Secure Cloud Integrations
hyper-advertiser.blogspot.com·1d
🛠cybersecurity
Flag this post
How to Write an Internal Policy for the Use of Artificial Intelligence
endoacustica.com·2d
⚖️AI Governance
Flag this post
GiftFlow: Self-hosted gift management with reimbursement tracking
github.com·12h·
Discuss: r/selfhosted
🛡️Privacy Engineering
Flag this post
Facade Pattern — Catalog of Enterprise Application Architecture Patterns 🏢
dev.to·2d·
Discuss: DEV
compliance
Flag this post
AIjacking Threat Exposed: How Hackers Hijacked Microsoft’s Copilot Agent Without a Single Click
blogger.com·2d
🛠cybersecurity
Flag this post
A Practical Guide to Managing Multiple Git Accounts with SSH
dev.to·2d·
Discuss: DEV
🔒MLSecOps
Flag this post
High-Severity Vulnerability CVE-2024-0670 Puts Checkmk Windows Agents at Risk
thecybersecguru.com·13h
🛠cybersecurity
Flag this post
I built a full Notion alternative using Obsidian plugins
xda-developers.com·9h
🔒MLSecOps
Flag this post
CORS and Same-Origin Policy Deep Dive
dev.to·5d·
Discuss: DEV
🛠cybersecurity
Flag this post
WhatsApp’s “We See You” Post Sparks Privacy Panic Among Users
blogger.com·15h
🛠cybersecurity
Flag this post
Setting Up SafeLine: Best Practices for Secure Web Traffic
dev.to·2h·
Discuss: DEV
🛠cybersecurity
Flag this post
The Real Limits of n8n “Free” Automation: What You Need to Know Before Shipping to Production
dev.to·18h·
Discuss: DEV
🔒MLSecOps
Flag this post