Category: Mix
We had a great conversation during February’s UL Mid-month Meetup, where we discussed our careers, how vulnerable they were to…
I know I’m supposed to be happy about all this AI innovation, but all it does is make me sad….
최근에 Apple이 내부에서 사용하던 Configuration language를 오픈소스로 공개헀습니다. 바로 Pkl(피클)인데요, 과연 Pkl은 JSON과 YAML과 함께 Config의 스타가 될 수 있을까요?…
HackerOne’s 7th Annual Hacker Powered Security Report states that improper access control is the second most common vulnerability reported in a…
❤️🔥 tl;dr Love OK this feels a bit awkward to share, but she gave me permission. My friend Tanya Janca…
As the implementation date of the Product Security and Telecommunications Infrastructure (PSTI) Act approaches, security professionals must understand and prepare…
Work on the most important problems possible I have a god-tier hack for improving the quality of your work, and…
Just over two years ago, General Motors became the first major automaker to launch a public Vulnerability Disclosure Program (VDP)….
What Is an AI Prompt? A prompt is an instruction given to an LLM to retrieve desired information to have…
How security professionals can achieve more with less The responsibilities of CISOs and other security professionals are growing more complex. As…
I hope you’ve been doing well! 📺️ Usable Security at Netflix How do you build security tooling & processes that…
E-commerce stores can lose out on a lot of revenue if price manipulation vulnerabilities get actively exploited by bad actors. …




![[tl;dr sec] #218 – Kubernetes Security Training Platform, Jupyter Attack Toolkit, Awesome GraphQL Security [tl;dr sec] #218 - Kubernetes Security Training Platform, Jupyter Attack Toolkit, Awesome GraphQL Security](https://image.cybernoz.com/wp-content/uploads/2024/02/tldr-sec-218-Kubernetes-Security-Training-Platform-Jupyter-Attack-360x270.png)



![How to Use AI Prompting for Security Vulnerabilities [3 Examples] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2024/02/How-to-Use-AI-Prompting-for-Security-Vulnerabilities-3-Examples-360x270.png)

![[tl;dr sec] #217 – Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI [tl;dr sec] #217 - Bypassing AWS CloudTrail, Usable Security at Netflix, Augmenting Humans with AI](https://image.cybernoz.com/wp-content/uploads/2024/02/tldr-sec-217-Bypassing-AWS-CloudTrail-Usable-Security-at-360x270.png)
