This is an open-source version of 'Security Training for Engineers', PagerDuty's internal employee technical security training, open to all PagerDuty employees as part of our continuous security training program.
The most copied StackOverflow snippet of all time is flawed!
In a recent study titled Usage and Attribution of Stack Overflow Code Snippets in GitHub Projects, an answer I wrote almost a decade ago was found to be the most copied snippet on Stack Overflow. Ironically it happens to be buggy.
Download a free, fully functional evaluation of PassMark OSForensics from this page, or download a sample hash set for use with OSForensics. 32-bit and 64-bit versions of OSForensics are available.
Firefox Lockwise — password manager — take your passwords everywhere
Firefox Lockwise lets you securely access the passwords you’ve saved in Firefox from anywhere — even outside of the browser. Features 256-bit encryption and Face/Touch ID.
Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `} - anouarbensaad/vulnx
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server.
The way we consume **open source software (OSS) dramatically changed** over the past decade or two. Flash back to the early 2000s, we mostly used large OSS projects from a small number of providers, such as Apache, MySQL, Linux and OpenSSL. These projects came from well-known software shops that maintained good development and quality practices. It wasn’t our code, but it felt trustworthy, and it was safe to assume it didn’t hold more bugs than our own code. Fast-forward to today and OSS has turned into crowd-sourced marketplaces. Node’s npm carries over 210,000 packages from over 60,000 co...
Web Security Academy – Cybersecurity Training from PortSwigger
Welcome to the Web Security Academy. This is a free learning resource on web security provided by PortSwigger. Free web security training The Web Security ...
Whether you're new to security or a veteran, you need to stay up to date on threats. Learn what ATO attacks are and what the most common types look like.
Examples of some features and the vulnerabilities that can exploit any webpage if target="_blank" is used without rel="noopener" - apal21/target-blank-vulnerabilities-features