Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain
12
Apr
2025

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what’s known as “Dangling DNS” records to take over corporate subdomains, posing significant threats to organizations’ security…

The Steam, Water, and Ice of Modern Communication
12
Apr
2025

The Steam, Water, and Ice of Modern Communication

A friend recently forwarded me an email I sent to him in 2004. It was part of conversation about where…

Malicious NPM Packages Targeting PayPal Users to Steal Sensitive Data
12
Apr
2025

Malicious NPM Packages Targeting PayPal Users to Steal Sensitive Data

FortiGuard Labs, Fortinet’s AI-driven threat intelligence arm, has uncovered a series of malicious NPM packages designed to steal sensitive information…

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware
12
Apr
2025

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute…

The Real Reason Git is Great
12
Apr
2025

The Real Reason Git is Great

This is the best argument I’ve come across for why git is special and worth your time. I’ve seen glimpses…

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites
12
Apr
2025

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites…

Two Great Videos for Your Creationist Friends
12
Apr
2025

Two Great Videos for Your Creationist Friends

This is one of the best refutations of the standard creationist arguments I’ve seen in a short video format. Combined…

Character Encoding: Which Schemes Encode to Which Sizes?
12
Apr
2025

Character Encoding: Which Schemes Encode to Which Sizes?

The subject of character mapping and encoding is formidable, and many confuse the various schemes and standards available. As a…

Her Name is Susan | Daniel Miessler
12
Apr
2025

Her Name is Susan | Daniel Miessler

I lack the words, but I don’t need them. I sometimes realize that I’m hesitant to talk about my love…

The VIA Model of Security Filtering Technologies
12
Apr
2025

The VIA Model of Security Filtering Technologies

I inwardly smile when I hear the term “Unified Threat Management”. It means different things to different people, but to…

Misconceptions about Unicode and UTF-8/16/32
12
Apr
2025

Misconceptions about Unicode and UTF-8/16/32

So everyone knows that UTF-8 encodes Unicode code points into eight bits, and UTF-16 encodes Unicode code points into 16…

Some Thoughts on the Economic Viability of E-Books
12
Apr
2025

Some Thoughts on the Economic Viability of E-Books

A friend of mine (I’ll identify him if he so desires) sent me the following email: I think this is…