Author: Cybernoz

A Philosophical Reason for Preferring Apple Over Android
19
Apr
2025

A Philosophical Reason for Preferring Apple Over Android

The horse is dead. Design, feel, features, openness, customizability — we’ve heard it all. The main arguments are well understood…

Adding a Trailing Slash to Directories Using Varnish
19
Apr
2025

Adding a Trailing Slash to Directories Using Varnish

My web configuration makes use of Varnish as a front-end, and I noticed a bug recently where asking for “/study”…

Detecting And Responding To New Nation-State Persistence Techniques
19
Apr
2025

Detecting And Responding To New Nation-State Persistence Techniques

Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated persistence techniques to maintain long-term…

Interesting Web Data from a Day on the Front Page of Hacker News
19
Apr
2025

Interesting Web Data from a Day on the Front Page of Hacker News

I spent yesterday on the front page of Hacker News for my git primer, which resulted in over 12K page…

How To Prioritize Threat Intelligence Alerts In A High-Volume SOC
19
Apr
2025

How To Prioritize Threat Intelligence Alerts In A High-Volume SOC

In today’s rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge: efficiently managing and prioritizing the…

How to Detect and Prevent DNS Tunneling Attack In Enterprise Networks
19
Apr
2025

How to Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System…

Reality is Organization | Daniel Miessler
19
Apr
2025

Reality is Organization | Daniel Miessler

Our entire universe consists of matter and energy interacting with itself according to the laws of physics. That is reality….

How to Implementing SOAR To Reduce Incident Response Time Effectively
19
Apr
2025

How to Implementing SOAR To Reduce Incident Response Time Effectively

In the modern digital landscape, organizations are constantly challenged by an ever-increasing volume of security alerts, sophisticated cyber threats, and…

How To Detect Obfuscated Malware That Evades Static Analysis Tools
19
Apr
2025

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis tools have become standard components…

SQL Injection is 90% SQL, WebSec is 90% WebDev
19
Apr
2025

SQL Injection is 90% SQL, WebSec is 90% WebDev

I believe too many people take the wrong approach to security, or “hacking”. Most who seek this ability clamor for…

The Power of Good Design
18
Apr
2025

The Power of Good Design

Man, this is a stunning site. Very few things make me as happy as strong typography—especially when done in a…

PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation
18
Apr
2025

PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation

A security vulnerability, tracked as CVE-2024-53141, has recently come to light in the Linux kernel’s ipset component. This flaw enables out-of-bounds…