ByteWaveNetworkEnhancing Kubernetes Security via KubesecKubernetes (K8s) has become the go-to container orchestration tool for deploying, scaling, and managing containerized applications…Sep 7
Ashish GavaliinGlobantAudit AWS Cloud Security using ScoutSuiteCloud Infrastructure services like AWS, Google Cloud, Microsoft Azure, and Alibaba Cloud have become very popular because they help to…Aug 30, 20231
Solidity AcademyOptimizing Solidity Smart Contracts: Security Audits and Gas Efficiency 🛡️In the rapidly evolving world of blockchain, Solidity smart contracts are the backbone of decentralized applications (DApps). Writing…Aug 27Aug 27
Kelig LefeuvreStep-by-step guide: How to scan your Google Apps Script project for CASADuring the CASA Tier 2 security assessment, it is necessary to scan your code by yourself, as it is not possible to use PWC’s default…Jan 196Jan 196
ByteWaveNetworkEnhancing Kubernetes Security via KubesecKubernetes (K8s) has become the go-to container orchestration tool for deploying, scaling, and managing containerized applications…Sep 7
Ashish GavaliinGlobantAudit AWS Cloud Security using ScoutSuiteCloud Infrastructure services like AWS, Google Cloud, Microsoft Azure, and Alibaba Cloud have become very popular because they help to…Aug 30, 20231
Solidity AcademyOptimizing Solidity Smart Contracts: Security Audits and Gas Efficiency 🛡️In the rapidly evolving world of blockchain, Solidity smart contracts are the backbone of decentralized applications (DApps). Writing…Aug 27
Kelig LefeuvreStep-by-step guide: How to scan your Google Apps Script project for CASADuring the CASA Tier 2 security assessment, it is necessary to scan your code by yourself, as it is not possible to use PWC’s default…Jan 196
Rushit JivaniHow to Ignore SSL for React Native (Android/iOS)Secure data transfer over the Internet is a modern need for mobile data, SSL pinning is a mechanism used to satisfy this requirement: It…Dec 19, 20224
Jason SchwarzExploiting Smart Contracts: Strict EqualitiesThis guide covers the dangerous-strict-equalities attack vector, providing detailed setup instructions, code examples, execution steps, and…Jul 15
Aardvark InfinityinAardvark InfinityActive Directory Security Audit ConfigurationInstall Required ToolsJul 3