CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call
23
Jun
2025

CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call

CoinMarketCap, the globally recognized cryptocurrency data aggregator, experienced a significant security incident when a vulnerability in its homepage doodle image…

Quantum risk is already changing cybersecurity
23
Jun
2025

Quantum risk is already changing cybersecurity

A new report from the Cyber Threat Alliance warns that the era of quantum risk is already underway, and security…

71% of new hires click on phishing emails within 3 months
23
Jun
2025

71% of new hires click on phishing emails within 3 months

New hires are more likely to fall for phishing attacks and social engineering than longer-term employees, especially in their first…

23
Jun
2025

WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi security explained

Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP,…

Build your own serverless subscriber list with Go and AWS
23
Jun
2025

Build your own serverless subscriber list with Go and AWS

You can now subscribe to my email list on victoria.dev! Here’s how I lovingly built a subscription sign up flow…

Citrix Identifies Netscaler ADC and Netscaler Gateway Vulnerabilities
23
Jun
2025

Citrix Identifies Netscaler ADC and Netscaler Gateway Vulnerabilities

Citrix has identified critical vulnerabilities in Citrix Netscaler ADC and NetScaler Gateway Products (CVE-2025-5349 and CVE-2025-5777). The Australian Signals Directorate’s…

23
Jun
2025

What is TCP/IP? Layers and protocols explained

A significant part of the process of creation is the ability to imagine things that do not yet exist. This…

Hacker
23
Jun
2025

WordPress Motors theme flaw mass-exploited to hijack admin accounts

Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme “Motors” to hijack administrator accounts and gain complete…

23
Jun
2025

Do One Thing: Mastering Prioritization for High-Performing Teams

In the tech teams I lead, “priority” has no plural form. Whether you’re leading a team of people or leading…

Russian hackers bypass Gmail MFA in advanced social engineering attack
23
Jun
2025

Russian hackers bypass Gmail MFA using stolen app passwords

Russian hackers bypass multi-factor authentication and access Gmail accounts by leveraging app-specific passwords in advanced social engineering attacks that impersonate…

23
Jun
2025

How to Write Good Documentation

If you’ve ever half-written a software project before taking a few days off, this is the article you’ll discover you…

Windows 11
23
Jun
2025

Windows Snipping Tool now lets you create animated GIF recordings

​Microsoft announced that the Windows screenshot and screencast Snipping Tool utility is getting support for exporting animated GIF recordings. This…