CoinMarketCap, the globally recognized cryptocurrency data aggregator, experienced a significant security incident when a vulnerability in its homepage doodle image…
A new report from the Cyber Threat Alliance warns that the era of quantum risk is already underway, and security…
New hires are more likely to fall for phishing attacks and social engineering than longer-term employees, especially in their first…
Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP,…
You can now subscribe to my email list on victoria.dev! Here’s how I lovingly built a subscription sign up flow…
Citrix has identified critical vulnerabilities in Citrix Netscaler ADC and NetScaler Gateway Products (CVE-2025-5349 and CVE-2025-5777). The Australian Signals Directorate’s…
A significant part of the process of creation is the ability to imagine things that do not yet exist. This…
Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme “Motors” to hijack administrator accounts and gain complete…
In the tech teams I lead, “priority” has no plural form. Whether you’re leading a team of people or leading…
Russian hackers bypass multi-factor authentication and access Gmail accounts by leveraging app-specific passwords in advanced social engineering attacks that impersonate…
If you’ve ever half-written a software project before taking a few days off, this is the article you’ll discover you…
Microsoft announced that the Windows screenshot and screencast Snipping Tool utility is getting support for exporting animated GIF recordings. This…








