Links
AddLet’s take a brief trip back to our school years and recall some lessons in mathematics and physics. Do you remember what the number π equals? And what is π squared? That’s a strange question too. Of course, it’s 9.87. And do you remember the value of the acceleration due to gravity, g? Of course, that number was drilled into our memory so thoroughly that it’s impossible to forget: 9.81 m/s². Naturally, it can vary, but for solving basic school problems, we typically used this value.
The CA/Browser Forum has voted to significantly reduce the lifespan of SSL/TLS certificates over the next 4 years, with a final lifespan of just 47 days starting in 2029.
Tigera, a startup that offers security and compliance solutions for Kubernetes container deployments, today announced that it has raised a $30 million
Ever wanted to play the worlds second most popular videogame without actually playing it? Well, I will guide you through it! First of all, what do I mean by 'Pl
If you're on one of the cheaper Anthropic plans like me, it's a pretty common scenario when you're deep into Claude coding an idea, to hit a daily or weekly
Computers are starting to have opinions on how our APIs should look like
Streamlining secure communication with ease
The world of custom mechanical keyboards is vibrant, with new designs emerging weekly. However, keyboards are just one way we interact with computers. Ploopy, an open-source hardware company, focus…
The Data Change Processing platform. Contribute to drasi-project/drasi-platform development by creating an account on GitHub.
Nobl9 has released an open specification for defining SLOs and, in addition, has defined a repeatable SLO methodology.
Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls.
Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.
Anthropic's Interactive Prompt Engineering Tutorial - anthropics/prompt-eng-interactive-tutorial
A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business functions. Includes automated scoring, contextual recommendations, and evidence-based evaluation. - devsecflow/Cloud-Native-Assurance-Maturity-Model
A lively discussion about open source, security, and who pays the bills has erupted on Twitter.
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.