Skip to content
loading...

Security Practices for Mobile App Developers

Reactions 3
6 min read

Use your Yubikey to its Fullest

Reactions 23 Comments 2
8 min read

Week 3: Introduction to John the Ripper

Reactions 4
5 min read

Week 2: Knowing the penetration testing steps

Reactions 12
4 min read

Sending the Referrer Policy Header with NGINX

Reactions 3
3 min read

Week 1: Being conscious about your attack surface

Reactions 7
5 min read

Week 0: Security blog posts introduction

Reactions 13
2 min read

OverTheWire Bandit Level 8 → Level 9 walk-through

Reactions 4
2 min read

Getting Started with AppSec V4

Reactions 25
2 min read

OverTheWire Bandit Level 7 → Level 8 walk-through

Reactions 11
1 min read

Building Secure REST API Services with Python

Reactions 15 Comments 2
4 min read

OverTheWire Bandit Level 6 → Level 7 walk-through

Reactions 6
2 min read

Two-minute InfoSec — Shell History Timestamps

Reactions 8
2 min read

OverTheWire Bandit Level 5 → Level 6 walk-through

Reactions 6
2 min read

OverTheWire Bandit Level 4 → Level 5 walk-through

Reactions 4
1 min read

OverTheWire Bandit Level 3 → Level 4 walk-through

Reactions 5
1 min read

How to Check a Sketchy Link Without Clicking It

Reactions 7
4 min read

What Is Tor and Should We Use It?

Reactions 15 Comments 9
4 min read

Stuffing of Credentials?

Reactions 16 Comments 6
3 min read

Google and Samsung Fix Android Flaw that Allowed to Hijack your Camera and Audio to Spy on You

Reactions 6
3 min read

Covert Channels and Data Exfiltration

Reactions 5
9 min read

Bypassing GitHub's OAuth flow

Reactions 12
2 min read

Attackers exploit 0day vulnerability that gives full control of Android phones

Reactions 6 Comments 2
2 min read

Hackers are using a bug in PHP7 to remotely hijack web servers

Reactions 13
2 min read

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Reactions 6
2 min read

This huge Android trojan malware campaign was discovered after the gang behind it made basic security mistakes

Reactions 6 Comments 5
2 min read

XSS and SQLi Polyglot Payloads

Reactions 8
3 min read

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Reactions 5 Comments 1
1 min read

Engaging in OverTheWire's Wargames

Reactions 7 Comments 1
3 min read

BSides Cymru Writeup - My Thoughts

Reactions 6
4 min read

ScamBaiting Vs HackTheBox

Reactions 7
4 min read

Presentations I would love to watch

Reactions 6
2 min read

Testing the Event Horizon - My InfoSec and QA Journey.

Reactions 5
3 min read

DevSlopChat about securing web apps hosted in Azure Storage

Reactions 9
2 min read

Getting Started with AppSec V3

Reactions 59
2 min read

Hacker Summer Camp 2019

Reactions 15
8 min read

OverTheWire Bandit Level 2 → Level 3 walk-through

Reactions 5
1 min read

The Dangers of Shadow IT

Reactions 4
3 min read

[Dev Discussion] Passwordless login?

Reactions 3 Comments 8
1 min read

Security Champion

Reactions 6
2 min read

OverTheWire Bandit Level 1 → Level 2 walk-through

Reactions 5
2 min read

OverTheWire Bandit Level 0 → Level 1 walk-through

Reactions 5
1 min read

OverTheWire Bandit Level 0 walk-through

Reactions 6
1 min read

Shall We Begin? >:-)

Reactions 7
2 min read

Hackitect series vol.2 - Open source cybersecurity zoo

Reactions 10
5 min read

Developers need to stop fearing the InfoSec Mafia

Reactions 9
1 min read

Safe Spaces & WoSEC

Reactions 18 Comments 3
3 min read

SELinux and AppArmor

Reactions 7
3 min read

Access Control List - ACL

Reactions 3
2 min read

How DevOps Increases System Security

Reactions 5
6 min read

Phishing my company. An infosec lesson for businesses

Reactions 6 Comments 1
5 min read

the infosec mindset

Reactions 11
3 min read

Practical Privacy: A Guide for Everyone

Reactions 8
1 min read

Gradual Security Claims

Reactions 7
3 min read

Question about topic

Reactions 7 Comments 7
1 min read

Effective Communication Security / Beyond 'Use Signal Use Tor'

Reactions 13 Comments 6
3 min read

Security Testing: Fighting against bots

Reactions 8
3 min read

#discussRaising security awareness with a CTF competition... did you already participate in one, how it was?

Reactions 7
1 min read

How to create own threat intelligence platform with PHP, cURL and API

Reactions 18
3 min read

#amaI'm 18 and I do systems security, Ask Me Anything!

Reactions 23 Comments 30
1 min read
loading...