Category: Mix

How to get the most out of your cybersecurity testing budget 
08
Feb
2024

How to get the most out of your cybersecurity testing budget 

How security professionals can achieve more with less The responsibilities of CISOs and other security professionals are growing more complex. As…

[tl;dr sec] #217 - Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI
08
Feb
2024

[tl;dr sec] #217 – Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI

I hope you’ve been doing well! 📺️ Usable Security at Netflix How do you build security tooling & processes that…

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites
08
Feb
2024

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites

E-commerce stores can lose out on a lot of revenue if price manipulation vulnerabilities get actively exploited by bad actors. …

What's new with BChecks? | Blog
08
Feb
2024

What’s new with BChecks? | Blog

Mike Eaton | 08 February 2024 at 09:05 UTC Earlier this year, we released BChecks, a powerful yet simple scripting…

AI, Deepfakes, and Phishing
08
Feb
2024

AI, Deepfakes, and Phishing

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; } .bh__table_cell { padding: 5px; background-color: #FFFFFF; } .bh__table_cell p { color:…

Required Security Changes for Secure AI Agents · Joseph Thacker
06
Feb
2024

Required Security Changes for Secure AI Agents · Joseph Thacker

Capable and secure AI agents will require new technologies. In order to expedite the utility of digital assistants by granting…

DEFCON Moves, AnyCloudDesk, Ransomware Learnings, My Top AI Projects
06
Feb
2024

DEFCON Moves, AnyCloudDesk, Ransomware Learnings, My Top AI Projects

Unsupervised Learning is a security, AI, and meaning-focused newsletter that looks at how best to thrive as humans in a…

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites
05
Feb
2024

Hunting Down The Top 5 Most Common Price Manipulation Vulnerabilities in E-Commerce Websites

E-commerce stores can lose out on a lot of revenue if price manipulation vulnerabilities get actively exploited by bad actors. …

Apple Vision Pro First Impressions
05
Feb
2024

Apple Vision Pro First Impressions

This first-impressions “review” will be a little different than most because: I’m a total Apple fanboy I’m not sold on…

Blocking Compromised Tokens with Wallarm
03
Feb
2024

Blocking Compromised Tokens with Wallarm

In our Annual API ThreatStats report, we highlighted the increasing threat of API Leaks. An API Leak is the disclosure…

Wallarm's Crusade Against Rising Credential Stuffing Threats
02
Feb
2024

Wallarm’s Crusade Against Rising Credential Stuffing Threats

Credential Stuffing, a vital yet often overlooked aspect of cybersecurity, needs to be addressed with urgency. An alarmingly large segment…

Introducing custom scan checks to Burp Suite Enterprise Edition | Blog
02
Feb
2024

Introducing custom scan checks to Burp Suite Enterprise Edition | Blog

Emma Stocks | 02 February 2024 at 11:26 UTC BChecks, in a nutshell, are easy to use custom-created scan checks…