Creativity Comes from Idleness – Daniel Miessler
A few years ago I figured out why we’re so creative in the shower Created/Updated: October 26, 2022 Our creativity is like a daily pool…
A few years ago I figured out why we’re so creative in the shower Created/Updated: October 26, 2022 Our creativity is like a daily pool…
What is vulnerability management? Vulnerability management is the process of continuously identifying, categorizing, and remediating technology system security vulnerabilities. Vulnerability management is a critical component…
Created/Updated: August 21, 2022 The internet’s gone a bit crazy about Sam Harris supposedly supporting censorship. As in most cases, a careful review of the…
Among the topics they explored included the success of their long-running bug bounty programs in discovering security vulnerabilities, how to explain program value to C-suite…
Triage is just as important to security teams as it is to hospital workers. Now, you can prioritize and remediate web application vulnerabilities even faster…
Midjourney is like using a Mac, and DALL-E is like using the Linux command line Created/Updated: August 21, 2022 Created by Midjourney We’ve all been…
Organizations need to identify, prioritize, and remediate these vulnerabilities as soon as possible. CVSS is a free and open industry standard for assessing the severity…
Created/Updated: September 7, 2022 In today’s standalone episode I’m going to talk about some new gaming ideas I’ve not seen anywhere else, and have their…
December 17th Update: Vulnerabilities in Log4j have been evolving over the course of this week since the original disclosure of CVE-2021-44228, also known as Log4Shell. …
On November 6th, 2019, Detectify added security tests for 50+ of the most popular WordPress plugins, including Easy-WP-SMTP. Although the zero-day affecting Easy-WP-SMTP (CVE-2020-35234) was…
Created/Updated: September 21, 2022 My mom died on Saturday. My biological mother became unable to function when I was around five due to mental illness,…
Common Weakness Enumeration (CWE) is a system to categorize software and hardware security flaws—implementation defects that can lead to vulnerabilities. It is a community project…