Category: Mix
A speed-run introduction to Matrix via Dendrite. Matrix is an open standard for decentralized real-time communication. The specification is production-ready…
Video Profile 33 years old Daniel Marte has only been hacking for 1 year, but has already made great strides….
Summary The following vulnerabilities were discovered in Progress Ipswitch WhatsUp Gold: The adivsory from Progress can be found here. Impact…
This post is part 2 of a series giving an overview of the most useful iOS app pentesting tools. ‘Cycript’…
Argo CD is a popular Continuous Deployment tool that enables DevOps teams to manage their applications across multiple environments. However,…
Building a secure application: the first step | Security Simplified Source link
TomNomNom Demos a Ben Eater 8-bit CPU Emulator Source link
Hey there, I hope you’ve been doing well! Semgrep in EU I was a bit sleepy when I was finishing…
A Pentesters Introduction To The New OWASP API Top 10 – 2023 RC Source link
Kindred Group disclosed a bug submitted by sw33tlie: https://hackerone.com/reports/1632973 – Bounty: $5250 Source link
Attacking JWT – Header Injections Source link
Answering your questions about Superbacked Source link







![[tl;dr sec] #168 – GCP and Azure Storage Threat Models, macOS Security, Red Team Resources [tl;dr sec] #168 - GCP and Azure Storage Threat Models, macOS Security, Red Team Resources](https://image.cybernoz.com/wp-content/uploads/2023/04/tldr-sec-168-GCP-and-Azure-Storage-Threat-Models-360x270.jpg)

![[www.32red.com] Reverse proxy misconfiguration leads to 1-click account takeover [www.32red.com] Reverse proxy misconfiguration leads to 1-click account takeover](https://image.cybernoz.com/wp-content/uploads/2023/04/www32redcom-Reverse-proxy-misconfiguration-leads-to-1-click-account-takeover.png)

