Category: Mix
Creating Continuous Attack Resistance In order to stay ahead of cybercriminals, businesses need to preemptively find flaws in their digital…
Matt Atkinson | 17 July 2023 at 14:26 UTC Check out our roadmap for Burp Suite and find out what…
예상보다 훨씬 빠른 시기에 ZAP 2.13이 릴리즈되었습니다. 보통 매년 가을, 겨울중에 릴리즈가 있었는데, 이번에는 여름에 릴리즈가 생겼네요. 변화된 부분이 크진…
Offensive AI Will Outpace Defensive AI In the short term, and possibly indefinitely, we will see offensive or malicious AI…
I hope you’ve been doing well! 🏋️ Our Gym If you’ve been wanting to improve your fitness but haven’t been…
Implementing an AWS multi-account strategy is a popular approach that helps organizations to manage their cloud resources efficiently. In my…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Summary An unauthenticated attacker can upload arbitrary files leading to remote code execution. A cryptographic flaw, coupled with a path…
여러가지 명령을 통해 ssl version 체크하는 방법들 간략하게 메모해둡니다. 개인적으로 주로 testssl.sh를 자주 사용했었는데, 쓰다보니 종종 다른 도구와 크로스 체크가…
I hope you’ve been doing well! 🎇 4th of July I spent my 4th of July, ironically, with a group…
In our web event “Getting Vulnerable”, we brought together program managers Jill Moné-Corallo from GitHub, Garrett McNamara from ServiceNow, and…
View vulnerabilities on each asset across your attack surface The attack surface is where you can understand what you have…



![The Future of Generative AI and Security [2 Predictions] Hackerone logo](https://image.cybernoz.com/wp-content/uploads/2023/07/The-Future-of-Generative-AI-and-Security-2-Predictions-360x270.png)
![[tl;dr sec] #190 – Securely Build on AI, CISA Pen Test repo, Joining Google’s Red Team [tl;dr sec] #190 - Securely Build on AI, CISA Pen Test repo, Joining Google's Red Team](https://image.cybernoz.com/wp-content/uploads/2023/07/tldr-sec-190-Securely-Build-on-AI-CISA-Pen-360x270.jpg)




![[tl;dr sec] #189 – CISA on Defending CI/CD, Backdooring NPM via S3, AI + Reverse Engineering [tl;dr sec] #189 - CISA on Defending CI/CD, Backdooring NPM via S3, AI + Reverse Engineering](https://image.cybernoz.com/wp-content/uploads/2023/07/tldr-sec-189-CISA-on-Defending-CICD-Backdooring-NPM-360x270.jpg)

