Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | Ep. 362 |…
Some thoughts inspired by International Women’s Day, Grace Hopper, and making contributions to the world of tech. It’s International Women’s…
After a day of prep, we were ready to launch into our first day of H1-702! What makes today…
On April 18, 2023, Google released a new update for Chrome Desktop versions with security updates for actively exploited second…
When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource…
Attackers are using Eval PHP, an outdated legitimate WordPress plugin, to compromise websites by injecting stealthy backdoors. Eval PHP is an…
If you follow Information Security at all you are surely aware of the LastPass breach situation. It started back in…
By Mishel Mejibovski, Head of Operations and Strategy, While some companies insist on going back to their original work practices…
How to set up a cross-platform solution for working with Git on iOS. 2019-03-15 11:55:28 -0400 -0400 March 15, 2019…
Google’s Threat Analysis Group (TAG) has been monitoring and disrupting Russian state-backed cyberattacks targeting Ukraine’s critical infrastructure in 2023. Google…
Encryption technology used by Ukraine to defend against the Russian invasion could be placed at risk by measures in the…
Welcome back to our first day of in-person hacking! We had some lovely people greeting you today for your check-in….