Navid HosseiniHow to Secure Your Flutter App: Protecting Sensitive DataWhen developing mobile apps, security is a top priority, especially when handling sensitive information embedded within the app, such as…12h ago1
Matt BentleyinLevel Up CodingHow and Why We Rolled Our Own Field Encryption Using Entity FrameworkHow we broke down our complex Encryption requirements using Field Encryption with Entity Framework Core. Including code, performance…5d ago1
Vasileiadis A. (CyberKid)Detect hidden surveillance cameras with your phoneA family recently it had a big surprise on their Airbnb: a hidden camera disguised as a smoke detector in the living room, monitoring their…Aug 525Aug 525
Pratham KrishnaS3: How can you secure your buckets & objects?I was having a conversation with a friend and we came across a question: “What is the attack surface for S3?”, which led me to writing this…11h ago11h ago
Tiexin Guoin4th CoffeeDependency Confusion Attacks and Prevention: Register Your Private Package NamesDependency confusion attacks exploit gaps in your software supply chain. Modern dependency management and best practices explained.Aug 252Aug 252
Navid HosseiniHow to Secure Your Flutter App: Protecting Sensitive DataWhen developing mobile apps, security is a top priority, especially when handling sensitive information embedded within the app, such as…12h ago1
Matt BentleyinLevel Up CodingHow and Why We Rolled Our Own Field Encryption Using Entity FrameworkHow we broke down our complex Encryption requirements using Field Encryption with Entity Framework Core. Including code, performance…5d ago1
Vasileiadis A. (CyberKid)Detect hidden surveillance cameras with your phoneA family recently it had a big surprise on their Airbnb: a hidden camera disguised as a smoke detector in the living room, monitoring their…Aug 525
Pratham KrishnaS3: How can you secure your buckets & objects?I was having a conversation with a friend and we came across a question: “What is the attack surface for S3?”, which led me to writing this…11h ago
Tiexin Guoin4th CoffeeDependency Confusion Attacks and Prevention: Register Your Private Package NamesDependency confusion attacks exploit gaps in your software supply chain. Modern dependency management and best practices explained.Aug 252
Mahdi MallakiinITNEXTDockerfile-less and Daemon-less BuildBuilding a Docker image without requiring a Dockerfile or Docker Daemon6d ago3
The Useful TechinMac O’ClockWhy Apple Passwords Is The Only Password Manager You NeedRead This If You Are Still Paying For A Password Manager1d ago3
Ryan McGeehaninStarting Up SecurityManaging a quarterly security reviewI like an approach that combines my favorite quarterly review practices I’ve been exposed to. Here’s the general meeting structure:Aug 14