MatSecCheese CTF TryhackMe: From SQL Injection to Root AccessIn this blog, I’ll guide you through the Cheese CTF challenge from TryHackMe. This room is packed with learning opportunities, including…17h ago
Han HELOIR, Ph.D. ☕️inLevel Up CodingOops, the AI Did It Again: A Guide to GenAI Security FailsKey Vulnerabilities From OWASP for LLMs and How to Mitigate ThemSep 171
Anshul KummarGoodbye Gmail: The Hard Truth About Why It’s Time for a ChangeThe end of an era.Sep 1853Sep 1853
Shlomi Boutnaru, Ph.D.The Linux Concept Journey — /dev/kmemAs with the device file “/dev/mem” (https://medium.com/@boutnaru/the-linux-concept-journey-dev-mem-ee697b16ed3d) also “/dev/kmem” can be…11h ago11h ago
Peter SolagnainGoogle Cloud - CommunityUsing VPC Service Controls to isolate data analytics use cases in Google CloudPushing the limits of VPC Service Controls to implement complex data access requirements.Sep 134Sep 134
MatSecCheese CTF TryhackMe: From SQL Injection to Root AccessIn this blog, I’ll guide you through the Cheese CTF challenge from TryHackMe. This room is packed with learning opportunities, including…17h ago
Han HELOIR, Ph.D. ☕️inLevel Up CodingOops, the AI Did It Again: A Guide to GenAI Security FailsKey Vulnerabilities From OWASP for LLMs and How to Mitigate ThemSep 171
Anshul KummarGoodbye Gmail: The Hard Truth About Why It’s Time for a ChangeThe end of an era.Sep 1853
Shlomi Boutnaru, Ph.D.The Linux Concept Journey — /dev/kmemAs with the device file “/dev/mem” (https://medium.com/@boutnaru/the-linux-concept-journey-dev-mem-ee697b16ed3d) also “/dev/kmem” can be…11h ago
Peter SolagnainGoogle Cloud - CommunityUsing VPC Service Controls to isolate data analytics use cases in Google CloudPushing the limits of VPC Service Controls to implement complex data access requirements.Sep 134
Michal SzoradHow I Hacked WhatsApp Web in 3 DaysThe process of exploring a WhatsApp Web ServiceWorker vulnerability causing a XSS with a significant impact.Sep 176
Piyush AgrawalinJavaScript in Plain EnglishHow to Secure Your Frontend in 2024 with Code: Best Practices for Modern Web DevelopmentIn 2024, the importance of securing your frontend has never been more critical. With increasing cyber threats and sophisticated attack…4h ago
Vasileiadis A. (CyberKid)Protect your WiFi from HackersWi-Fi Hacking is much easier than most people think and the way to achieve it is some common techniques that most hackers use. With a few…Aug 2910