Found 81 bookmarks
Newest
Agent of Chaos: Hijacking NodeJS’s Jenkins Agents
Agent of Chaos: Hijacking NodeJS’s Jenkins Agents
Two CI/CD vulnerabilities in the nodejs/node GitHub repository exposed Node.js to remote code execution on Jenkins agents and the potential to merge unreviewed code to the main branch of the repository.
·praetorian.com·
Agent of Chaos: Hijacking NodeJS’s Jenkins Agents
microsoft/WhatTheHack: A collection of challenge based hack-a-thons including student guide, coach guide, lecture presentations, sample/instructional code and templates. Please visit the What The Hack website at: https://aka.ms/wth
microsoft/WhatTheHack: A collection of challenge based hack-a-thons including student guide, coach guide, lecture presentations, sample/instructional code and templates. Please visit the What The Hack website at: https://aka.ms/wth
A collection of challenge based hack-a-thons including student guide, coach guide, lecture presentations, sample/instructional code and templates. Please visit the What The Hack website at: https:...
·github.com·
microsoft/WhatTheHack: A collection of challenge based hack-a-thons including student guide, coach guide, lecture presentations, sample/instructional code and templates. Please visit the What The Hack website at: https://aka.ms/wth
TLS Certificates - For The Rest Of Us
TLS Certificates - For The Rest Of Us
How does your browser know a website is legit? This post simplifies TLS, certificate validation, and the trust chain behind secure connections
·tusharf5.com·
TLS Certificates - For The Rest Of Us
API Security: Key Protocols - APIDNA
API Security: Key Protocols - APIDNA
Here we go through some of the essential protocols required for robust API security.
·apidna.ai·
API Security: Key Protocols - APIDNA
Intro to AI Security Part 1: AI Security 101
Intro to AI Security Part 1: AI Security 101
For at least two years now I have been complaining about the lack of Artificial Intelligence (AI) Security resources. I complain about many…
·medium.com·
Intro to AI Security Part 1: AI Security 101
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
Introduction DevOps has been rapidly evolving in the software development landscape, and from the cornerstone Docker has emerged. Its ability to package applications into portable, scalable containers has taken deployment strategies to the next level. However, with this power, comes the responsibility of securing the containers. In this blog, we dive deep into advanced techniques and best practices for securing Docker containers, ensuring your deployments are not just efficient but also fortified against a variety of cyber threats.
·blog.coderco.io·
How to Fortify Your Docker Containers: A Guide to Advanced Security Practices
Rego 101: Introduction to Rego | Snyk
Rego 101: Introduction to Rego | Snyk
Learn how to write your first policy as code rules in Rego. This Rego tutorial for beginners covers the basics of Rego syntax and using OPA.
·snyk.io·
Rego 101: Introduction to Rego | Snyk