What Happens to Content When Top-Tier Presentation is Commoditized?
I think AI is about to massively improve the quality of our best content. But not for the reason you...
Read more →I think AI is about to massively improve the quality of our best content. But not for the reason you...
Read more →The debate was quite fun to watch, but also frustrating. What irked me about the debate—and all similar debates—is that...
Read more →So we’re seeing homograph attacks again. Examples show how ‘apple.com’ and ‘epic.com’ can be mimicked by the use of Internationalized...
Read more →While researching a web application last February, I learned about Slanger, an open source server implementation of Pusher. In this...
Read more →Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by...
Read more →Download my transcription of Bill Evans’ piano solo in I’ve Got You Under My Skin below. The solo starts around...
Read more →When performing security tests, you will often be required to send all of your traffic through a VPN. If you...
Read more →In this write-up, I want to share a cool way in which I was able to bypass firewall limitations that...
Read more →Last May, I discovered that a critical vulnerability I had reported earlier this year had resulted in my first CVE....
Read more →An example use case of bbrf, here integrating with subfinder from projectdiscovery.io Like anyone involved in bug bounty hunting, I...
Read more →If you’re a Burp Suite user, you’ll be familiar with Burp Collaborator: a service that allows you to monitor out-of-band...
Read more →Axel Springer has long been a pioneer in the digital publishing industry, with a vast portfolio of brands, such as...
Read more →