Multi-Region Row Level Security in CockroachDB

Mistakes Microsoft made in the Xbox security system (2005)

Jurisdiction Is Nearly Irrelevant to the Security of Encrypted Messaging Apps

After managing 50+ security breaches, I documented our incident response framework with ready to use forensic scripts

Study shows that even a company well-prepared for a cyber-attack found experiencing a real ransomware incident was the only way to identify and fix crucial gaps in its security processes and internal rules

TSA to end shoes-off policy for airport security screening

Rust security best practices for software engineers

Hiring Remote Lead Security Engineer – Go + Kubernetes + gRPC

Spring Boot security best practices for software engineers

Cloud security is a mess collected every useful script I could find

Some easy-to-miss Spring Boot security mistakes (and how to avoid them)

Day 35: Environment Variables in Node.js — Best Practices & Security Tips

Code Sharing and Execution Platform Security Risks?

Building and Sharing a Practical Python Security Checklist

Unexpected security footguns in Go's parsers

US Government takes down major North Korean 'remote IT workers' operation

Weaponizing Dependabot: Pwn Request at its finest

Bruteforcing the phone number of any Google user

DNS4EU for Public Is Available

EchoLeak – 0-Click AI Vulnerability Enabling Data Exfiltration from 365 Copilot

Bypassing GitHub Actions policies in the dumbest way possible

Triaging security issues reported by third parties

The 16-billion-record data breach that no one’s ever heard of

Uncle Sam wants you – to use memory-safe programming languages

Breaking WebAuthn, FIDO2, and Forging Passkeys

Security Advisory: Airoha-based Bluetooth Headphones and Earbuds

I made my VM think it has a CPU fan

Android phones could soon warn you of "Stingrays" snooping on your communicatio

Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development [pdf]

Breaking My Security Assignments

More →