Category: Mix

Migrating to the cloud but without screwing it up, or how to move house
19
Apr
2023

Migrating to the cloud but without screwing it up, or how to move house

A practical guide to moving to cloud services with minimal downtime, using AWS examples. For an application that’s ready to…

Announcing the Results of Hack U.S.
19
Apr
2023

Announcing the Results of Hack U.S.

On July 4th, 2022, Chief Digital and Artificial Intelligence Office (CDAO), Directorate for Digital Services (DDS), DoD Cyber Crime Center…

Why is securing the external attack surface a hot topic for security experts right now?
19
Apr
2023

Why is securing the external attack surface a hot topic for security experts right now?

Gone are the days when gate-based security processes were the most effective way to ensure security of an organization’s external…

Summary: Andrej Karpathy on Lex Fridman’s Podcast (Late 2022)
19
Apr
2023

Summary: Andrej Karpathy on Lex Fridman’s Podcast (Late 2022)

This is member content. Thank you for being a subscriber. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image: linear-gradient(180deg, #000…

19
Apr
2023

Secure application architecture basics: separation, configuration, and access

A starting point for building secure application architecture, for busy developers. Software developers today are encouraged to focus on building,…

Bug Bytes #196 – Prompt Injection, Self Healing Code, Access Control and Hacker Motivation
19
Apr
2023

Bug Bytes #196 – Prompt Injection, Self Healing Code, Access Control and Hacker Motivation

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

Let’s Celebrate the Hacker Community
19
Apr
2023

Let’s Celebrate the Hacker Community

October is Cybersecurity Awareness Month, but at HackerOne, we’ve decided it should be Hacker Awareness Month. We want to spend…

Top 3 mistakes when implementing an External Attack Surface Management (EASM) program
19
Apr
2023

Top 3 mistakes when implementing an External Attack Surface Management (EASM) program

TLDR: Proactive external attack surface management (EASM) has become increasingly important than ever before as organizations face an expanding threat…

How to quickly batch resize, compress, and convert images with a Bash one-liner
19
Apr
2023

How to quickly batch resize, compress, and convert images with a Bash one-liner

A fast command line interface solution for batch image processing. Part of my Hugo site continuous deployment workflow is the…

TikTok Celebrates Two Years of Bug Bounty
19
Apr
2023

TikTok Celebrates Two Years of Bug Bounty

In the last two years of their bug bounty program, the hacker community has helped TikTok identify and disclose 450…

Meet the Hacker: Goonjeta Malhotra - “Hacking has always felt like a superpower”
19
Apr
2023

Meet the Hacker: Goonjeta Malhotra – “Hacking has always felt like a superpower”

TL/DR: Much like Darlene Alderson from Mr Robot, Goonjeta Malhotra entered the hacking battleground and sharpened her chops after taking…

A portable Makefile for continuous delivery with Hugo and GitHub Pages
19
Apr
2023

A portable Makefile for continuous delivery with Hugo and GitHub Pages

My Makefile for building this site, optimizing images, and running my CI/CD GitHub Actions flow. Fun fact: I first launched…