Author: Cybernoz

How to Survive and Thrive in a World Where AI Can Do Almost Everything
21
Apr
2023

How to Survive and Thrive in a World Where AI Can Do Almost Everything

Click for printable size. Here’s a quick list of things we can do to get ready for AI’s ascendance. You…

macOS logo with storms in the background
21
Apr
2023

The Week in Ransomware – April 21st 2023

A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an…

21
Apr
2023

A Unicode substitution cipher algorithm

How a fun but useless project turned into a Unicode substitution cipher algorithm. Full transparency: I occasionally waste time messing…

Getting Started as a High School Bug Hunter: Cubed's Hacker AFK
21
Apr
2023

Getting Started as a High School Bug Hunter: Cubed’s Hacker AFK

Today’s hacker Cubed JXoaT >> What was your experience with the word hacker, or what brought you to hacking in…

SSE Decoded: Answers to Your Questions About Secure Service Edge
21
Apr
2023

SSE Decoded: Answers to Your Questions About Secure Service Edge

Secure Service Edge works with a variety of network configurations. Is it right for yours? By Chris Alberding & Evin…

Detectify Teams up with Hackers for Change
21
Apr
2023

Detectify Teams up with Hackers for Change

STOCKHOLM — Aug. 18, 2021 — Detectify, the SaaS security company powered by ethical hackers, today announced its partnership with…

GPT and Search - Daniel Miessler
21
Apr
2023

GPT and Search – Daniel Miessler

Created/Updated: December 12, 2022 There’s a lot of talk about how GPT is going to take over search. Meaning, compete…

Power lines
21
Apr
2023

Critical infrastructure also hit by supply chain attack behind 3CX breach

The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical…

21
Apr
2023

Moving to a new domain without breaking old links with AWS & Disqus

I moved my site’s blog to its own domain without breaking old links or losing comments. Here’s how. I started…

Google Cloud Platform
21
Apr
2023

GhostToken GCP flaw let attackers backdoor Google accounts

Google has addressed a Cloud Platform (GCP) security vulnerability impacting all users and allowing attackers to backdoor their accounts using…

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks
21
Apr
2023

Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks

MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the most dangerous software vulnerabilities, has…

Core Values at Detectify: Turning problems into opportunities
21
Apr
2023

Core Values at Detectify: Turning problems into opportunities

At Detectify, we like to approach problems as opportunities for improvement. In the last couple of months, we’ve faced two…