Rosecurify

Seclog - #18

Content Moderation & Fraud Detection - Patterns in Industry

SNI Injection

How to set up Dynamic DNS on FreeIPA for your Kubernetes Cluster

ChatGPT Explained: A Normie's Guide To How It Works

Rustproofing Linux (Part 1/4 Leaking Addresses) โ€“ NCC Group Research

The Hunter Behind the Hacker

CircleCI Security Incident โ€” the conda-forge blog

Trail of Bits Security Audit | Drift

Introducing Proxy Enriched Sequence Diagrams (PESD)

Announcing Cloudflare Fraud Detection

I hacked Blackhat! ๐Ÿ˜Ž๐Ÿค˜- Responsible vulnerability disclosure

1083278 - Security: DNS Cache Poisoning through resource exhaustion in Chrome

sectweet #

Hats.Finance ๐Ÿฆ‡๐Ÿ”Š on Twitter: "1/6 Last week @BeanstalkFarms deployed our ethical return contract with the purpose to increase the return bounty to 40%. A message was sent by the beanstalk team to the exploiter to legally return all funds and receive a bounty without persecution ๐Ÿงต๐Ÿ‘‡" / Twitter

secvideo #

Hacking CI/CD (Basic Pipeline Poisoning)

Secure Your CI/CD Pipeline

secgit #

The-Art-of-Hacking/h4cker

MFMokbel/Crawlector

imran-parray/Mind-Maps

vitorfhc/queryxss

qsocket/qsocket

YousefAmery/PostgreSQL-RCE-Extensions


Suggestions & Feedback

Enjoyed this post? Subscribe to Seclog for more in-depth security analysis and updates.

For any suggestions or feedback, please contact us at: [email protected]

Subscribe to Seclog

Enjoyed this post? Subscribe for more in-depth security analysis and updates direct to your inbox.

No spam. Only high-security insights. Unsubscribe at any time.

Share this Seclog:

← Back to Seclog