Category: Mix

[tl;dr sec] #279 - Security for High Velocity Engineering, Cloud Incident Readiness, AI-powered Malware Implants
15
May
2025

[tl;dr sec] #279 – Security for High Velocity Engineering, Cloud Incident Readiness, AI-powered Malware Implants

I hope you’ve been doing well! I’m absolutely thrilled to share a new guest post from my friend Jason Chan….

Developer Leaks API Key for Private Tesla, SpaceX LLMs — API Security
15
May
2025

Developer Leaks API Key for Private Tesla, SpaceX LLMs — API Security

In AI, as with so many advancing technologies, security often lags innovation. The xAI incident, during which a sensitive API…

a first step to a more centralized approach
14
May
2025

a first step to a more centralized approach

We’re pleased to share a significant new change to our platform for companies.  Our goal is to empower our customers…

What's new in Burp Suite Professional: A year of innovation | Blog
14
May
2025

What’s new in Burp Suite Professional: A year of innovation | Blog

Eleanor Clarke | 14 May 2025 at 08:26 UTC Over the past year, we’ve been hard at work making Burp…

A practitioner’s guide to classifying every asset in your attack surface
13
May
2025

A practitioner’s guide to classifying every asset in your attack surface

TLDR: This article details methods and tools (from DNS records and IP addresses to HTTP analysis and HTML content) that…

12
May
2025

Hive Five 223 – Career Dreamer

I just returned from a whirlwind weekend trip to New York with my family, and let me tell you, it…

The Ongoing Risks of Hardcoded JWT Keys — API Security
12
May
2025

The Ongoing Risks of Hardcoded JWT Keys — API Security

In early May 2025, Cisco released software fixes to address a flaw in its IOS XE Software for Wireless LAN…

The link between security maturity and bug bounty success
12
May
2025

The link between security maturity and bug bounty success

What defines a security maturity posture?   A security maturity posture refers to an organization’s ability to detect, manage, and mitigate…

Reverse Engineering Granola to Get Notes In Obsidian · Joseph Thacker
08
May
2025

Reverse Engineering Granola to Get Notes In Obsidian · Joseph Thacker

I love granola.ai. Everyone I know is using it for meeting transcription. I’ve been using it to transcribe my calls…

[tl;dr sec] #278 - North Korean IT Workers, How Sentinel One Defends Itself, How Threat Actors Use Claude
08
May
2025

[tl;dr sec] #278 – North Korean IT Workers, How Sentinel One Defends Itself, How Threat Actors Use Claude

Several posts on DPRK IT workers infiltrating companies, Sentinel One on fighting off threat actors, Anthropic shares how attackers were…

How Attackers Are Exploiting Business Logic
08
May
2025

How Attackers Are Exploiting Business Logic

As businesses rely more on APIs, attackers are quick to turn that trust into opportunity. Among the most dangerous and…

AI Solution Factories
06
May
2025

AI Solution Factories | Daniel Miessler

Everyone is trying to figure out whether developers are screwed or not. Some say they are, and others say more…