Category: Mix
Amelia Coen | 05 August 2025 at 11:08 UTC Ever wondered how attackers can compromise modern websites by exploiting invisible…
I think the future of Substack is self-hosting. Or—more directly—I don’t think they have much of a future. I’m sure…
Think you know what to expect from a conference booth? Think again. Forget the cliches: the swag destined for the…
Super hyped to be launching the first version of Daemon today! My daemon is my personal API that anyone—or any…
My latest depressing thought about AI is that with all the pressure to adopt AI and replace employees with automation,…
As more organizations lean on third-party platforms, cloud infrastructure, and remote development teams, the attack surface grows, often faster than…
Tools to scan MCP servers and an MCP WAF, 4 AppSec archetypes, how to strategically protect your org with limited…
I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most…
Most of your targets often resort to using content delivery networks (CDNs) or other anti-DDoS reverse proxies to mask their…
Optical Network Terminals (ONTs) are devices that convert fiber optic signals to Ethernet signals that can be handled by typical…
Bun’s auto-install feature If you hate Python as much as me it’s probably because of dependencies. Roughly 23-319% of the…
I have a bunch of ideas I want to share here, but let me first start with what I’m doing…




![[tl;dr sec] #290 – Securing MCP, AppSec Archetypes, CISO’s Guide to Protecting Crown Jewels [tl;dr sec] #290 - Securing MCP, AppSec Archetypes, CISO's Guide to Protecting Crown Jewels](https://cybernoz.com/wp-content/uploads/2025/07/tldr-sec-290-Securing-MCP-AppSec-Archetypes-CISOs-Guide.png)


