Michal SzoradHow I Hacked WhatsApp Web in 3 DaysThe process of exploring a WhatsApp Web ServiceWorker vulnerability causing a XSS with a significant impact.1d ago5
Han HELOIR, Ph.D. ☕️inLevel Up CodingOops, the AI Did It Again: A Guide to GenAI Security FailsKey Vulnerabilities From OWASP for LLMs and How to Mitigate Them2d ago
Douglas Giles, PhDinBootcampThe Abject Stupidity of Two-Factor AuthenticationThinking is good. If you think well, then you can solve problems. If you don’t think, then you cause problems. The worst problems are the…Aug 6154Aug 6154
Enrique DansinEnrique DansIs it worth stealing an iPhone anymore?In what was a not particularly inspiring launch of new products and Apple devices on September 9, one thing went relatively unnoticed…5h ago15h ago1
Peter SolagnainGoogle Cloud - CommunityUsing VPC Service Controls to isolate data analytics use cases in Google CloudPushing the limits of VPC Service Controls to implement complex data access requirements.6d ago46d ago4
Michal SzoradHow I Hacked WhatsApp Web in 3 DaysThe process of exploring a WhatsApp Web ServiceWorker vulnerability causing a XSS with a significant impact.1d ago5
Han HELOIR, Ph.D. ☕️inLevel Up CodingOops, the AI Did It Again: A Guide to GenAI Security FailsKey Vulnerabilities From OWASP for LLMs and How to Mitigate Them2d ago
Douglas Giles, PhDinBootcampThe Abject Stupidity of Two-Factor AuthenticationThinking is good. If you think well, then you can solve problems. If you don’t think, then you cause problems. The worst problems are the…Aug 6154
Enrique DansinEnrique DansIs it worth stealing an iPhone anymore?In what was a not particularly inspiring launch of new products and Apple devices on September 9, one thing went relatively unnoticed…5h ago1
Peter SolagnainGoogle Cloud - CommunityUsing VPC Service Controls to isolate data analytics use cases in Google CloudPushing the limits of VPC Service Controls to implement complex data access requirements.6d ago4
Andrew BloomaninOSINT TeamBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 212
Robert WallaceinMuonUnitap Integrating with MuonUnitap is the latest partner leveraging the Muon tech stack to power their fair, secure & chain-independent Web3 Campaigns.2h ago
Vasileiadis A. (CyberKid)Protect your WiFi from HackersWi-Fi Hacking is much easier than most people think and the way to achieve it is some common techniques that most hackers use. With a few…Aug 2910