Aggregator
The Extended AWS Security Ramp-Up Guide
9 months ago
The factoring dead: Preparing for the cryptopocalypse
9 months ago
The disadvantages of a blacklist-based approach to input validation
9 months ago
The economics of defensive security
9 months ago
The death of USB autorun and the rise of the USB keyboard
9 months ago
The Demise of Signature Based Antivirus
9 months ago
The Database Hacker’s Handbook
9 months ago
The Challenges of Fuzzing 5G Protocols
9 months ago
The CIS Security Standard for Docker available now
9 months ago
The Case of Missing File Extensions
9 months ago
The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems
9 months ago
The Automotive Threat Modeling Template
9 months ago
The Browser Hacker’s Handbook
9 months ago
The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations
9 months ago
The ABCs of NFC chip security
9 months ago
Testing Infrastructure-as-Code Using Dynamic Tooling
9 months ago
Testing Two-Factor Authentication
9 months ago
Testing HTTP/2 only web services
9 months ago
Technical Advisory: Unauthenticated Remote Command Execution through Multiple Vulnerabilities in Virgin Media Hub 3.0
9 months ago