Links
AddIntroduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]
The OSI, the self-appointed arbiter of all things open source, has released its first definition of 'open source' AI.
Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents.
AWS has released a new whitepaper that has been requested by many AWS customers: AWS Policy Perspectives: Data Residency. Data residency is the requirement that all customer content processed and stored in an IT system must remain within a specific country’s borders, and it is one of the foremost concerns of governments that want to […]
Explore how GitHub Advanced Security can help address several of the OWASP Top 10 vulnerabilities
FireGiant's Open Source project to provide most powerful set of tools available to create your Windows installers.
(WIP) Zed fork focused on privacy and being local-first - zedless-editor/zed
Free domain research tool to discover hosts related to a domain. Find visible hosts from the attackers perspective for Red and Blue Teams.
Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer. - nicanorflavier/spf-dkim-dmarc-simplified
A collection of Free Public APIs for Students and Developers. Tested every single day.
Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.
Design, test, and distribute Agent Skills with reusable templates, collaborative reviews, and multi-surface deployment.
Researchers have found the first new type of magnet in nearly a century. Now, these strange "altermagnets" could help us build an entirely new type of computer
It could have been a contemporary of Risk, Diplomacy, and other legendary wargames
Pulumi and System Initiative Spice Up Infrastructure as Code to challenge IaC leader HashiCorp, which is being acquired by IBM.
To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]