Category: Mix
I recently sat down with Tejpal Garwhal, Application Security and DevSecOps Leader, for a conversation debunking some of the most…
Most of your targets often resort to using content delivery networks (CDNs) or other anti-DDoS reverse proxies to mask their…
Optical Network Terminals (ONTs) are devices that convert fiber optic signals to Ethernet signals that can be handled by typical…
Bun’s auto-install feature If you hate Python as much as me it’s probably because of dependencies. Roughly 23-319% of the…
I have a bunch of ideas I want to share here, but let me first start with what I’m doing…
Kai: AI-powered coding in Neovim (click for full size) I use LazyVim, btw. lol I’ve been using AI to help…
Comparing Fuse.js and Elasticlunr.js for Zola’s client-side search. Learn which library suits your static site’s needs. Zola is a fast…
On July 19, 2025, a critical remote code execution (RCE) vulnerability (CVE-2025-53770, also referred to as ToolShell) was publicly disclosed,…
When it comes to AI, people are often in one of two camps: They’re freaking out about AI and it’s…
Building My Custom AI Therapist This week I played around with building my own custom AI therapist, and found…
Andrew Storms, VP of Security at Replicated, has spent three decades on the frontlines of cybersecurity. From building Unix systems…
I think a lot about why people aren’t happy. I’m reading a book now by Bertrand Russell that offers a…






![[tl;dr sec] #289 – AI-powered Fuzzing, Incentives in Security, Malware in DNS [tl;dr sec] #289 - AI-powered Fuzzing, Incentives in Security, Malware in DNS](https://image.cybernoz.com/wp-content/uploads/2025/07/tldr-sec-289-AI-powered-Fuzzing-Incentives-in-Security-Malware.png)
