π Uncovering Critical Vulnerabilities in Jenkins | π Debugging your GitHub Actions | π Mastering Privilege Management for Developers
π₯· Discover Google's Security Scaling Strategies | βπΌ Signing Commits as Any User | π‘οΈ Prevent Your Website from Cloning Attacks
π« Debunking WAF Myths | π΅οΈββοΈ Capturing Exploits with Dynamic Honeypots | πΈ Inside the World of Bulletproof Hosting for Cybercriminals
π₯ 178k SonicWall Firewalls Are Publicly Exploitable | πΎ Detecting iOS Malware via Shutdown.log File | βοΈ The State of Software Supply Chain Security 2024
π How to break into password vaults without using passwords | π One Supply Chain Attack to Rule Them All | πΆβπ«οΈ Fuzzing and Bypassing the AWS WAF
Introducing YARA-Forge, AWS Security Services Best Practices, Weaponizing DHCP DNS Spoofing
Navigating the Maze of Incident Response, Process Injection Using Windows Thread Pools,
Blind CSS Exfiltration, Extracting Training Data from ChatGPT, How Adversaries Infiltrate AWS Cloud Accounts
Taking over a country Kaminsky style, This is a security data lake, Finding complex attack paths in Kubernetes clusters
The Architecture of Today's LLM Applications, Attacking GitLab CI/CD via Shared Runners, Detecting Browser Credential Stealing