
Security Pills - Issue 39
Heuristics for smart contracts, Abusing HTTP Hop-by-hop headers, Bitcoin Address Clustering

Security Pills - Issue 38
The ABCs of Ethereum Virtual Machine, Overview of the Inflation Attack, Practical Introduction to CodeQL

Security Pills - Issue 37
Reusable properties for Ethereum contracts, GitHub Security Lab audited DataHub, Demystifying Exploitable Bugs in Smart Contracts

Security Pills - Issue 36
How BlockSec Rescued Stolen Funds, OWASP Kubernetes Top 10, Zero Transfer Phishing

Security Pills - Issue 35
Server-side prototype pollution, Entering the Huff ecosystem, RCE in your Azure Web Service
Security Pills /

Security Pills - Issue 34
Fearless CORS, Top 10 web hacking techniques of 2022, Cracking the Odd Case of Randomness in Java
Security Pills /

Security Pills - Issue 33
Learning CodeQL, Bonq Protocol Got Bonked for $120M, Breaking Docker Named Pipes SYSTEMatically
Security Pills /

Security Pills - Issue 32
Scaling Continuous Security, Setting Bear Traps in the Dark Forest, Exploiting Hardcoded Keys to Achieve RCE
Security Pills /

Security Pills - Issue 31
An Incomplete Guide to Stealth Addresses, Bypassing Authorization in GC Workstations, Manipulating AES Traffic Using a Chain of Proxies and Hardcoded Keys
Security Pills /

Security Pills - Issue 30
How to Analyze Bitcoin Data with SQL, Fake Token Trendy, Vulnerable Spots of Lending Protocols
Security Pills /