Category: Mix

HTTP Request Smuggling Explained: with seasoned bug bounty hunter NahamSec and world-class researcher James Kettle
05
Aug
2025

HTTP Request Smuggling Explained: with seasoned bug bounty hunter NahamSec and world-class researcher James Kettle

Amelia Coen | 05 August 2025 at 11:08 UTC Ever wondered how attackers can compromise modern websites by exploiting invisible…

05
Aug
2025

Why Platforms Like Substack Won’t Make Sense for Much Longer

I think the future of Substack is self-hosting. Or—more directly—I don’t think they have much of a future. I’m sure…

Why We Built a Museum Instead of a Booth — API Security
04
Aug
2025

Why We Built a Museum Instead of a Booth — API Security

Think you know what to expect from a conference booth? Think again.  Forget the cliches: the swag destined for the…

01
Aug
2025

Launching Daemon: My Personal API

Super hyped to be launching the first version of Daemon today! My daemon is my personal API that anyone—or any…

01
Aug
2025

Increased Worker Pressure from AI

My latest depressing thought about AI is that with all the pressure to adopt AI and replace employees with automation,…

Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.
01
Aug
2025

Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.

As more organizations lean on third-party platforms, cloud infrastructure, and remote development teams, the attack surface grows, often faster than…

[tl;dr sec] #290 - Securing MCP, AppSec Archetypes, CISO's Guide to Protecting Crown Jewels
31
Jul
2025

[tl;dr sec] #290 – Securing MCP, AppSec Archetypes, CISO’s Guide to Protecting Crown Jewels

Tools to scan MCP servers and an MCP WAF, 4 AppSec archetypes, how to strategically protect your org with limited…

Debunking API Security Myths
31
Jul
2025

Debunking API Security Myths

I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most…

How to identify the origin IP
29
Jul
2025

How to identify the origin IP

Most of your targets often resort to using content delivery networks (CDNs) or other anti-DDoS reverse proxies to mask their…

Top view
27
Jul
2025

Getting a Shell on the LAU-G150-C Optical Network Terminal

Optical Network Terminals (ONTs) are devices that convert fiber optic signals to Ethernet signals that can be handled by typical…

27
Jul
2025

Self-Contained TypeScript Programs Using Bun

Bun’s auto-install feature If you hate Python as much as me it’s probably because of dependencies. Roughly 23-319% of the…

27
Jul
2025

Building a Personal AI Infrastructure (PAI)

I have a bunch of ideas I want to share here, but let me first start with what I’m doing…