Links
AddCommunity guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto. - drduh/YubiKey-Guide
Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a
Sticking to container security best practices is critical for successfully delivering secure software.
Ghostty is a fast, feature-rich, and cross-platform terminal emulator that uses platform-native UI and GPU acceleration.
The open source Zapier alternative. Build workflow automation without spending time and money. - automatisch/automatisch
Four related algorithms are now ready for use to protect data created and transmitted by the Internet of Things and other electronics
▦ Universal, standards-based auth provider. Contribute to toolbeam/openauth development by creating an account on GitHub.
Internet Archive's "The Wayback Machine" has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records.
A robotic lunar lander built by Texas-based Firefly has successfully landed on the moon, becoming only the second private-sector company ever to complete such a feat.
Monitor your entire IT environment securely. Full-stack SaaS-based monitoring combined with the power of AIOps.
In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).
Today marks two years since I first set up an e-ink display in my mom’s apartment to help her live on her own with amnesia.
We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation Security Administration.
Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more - prowler-cloud/prowler
Unimog is the Layer 4 Load Balancer for Cloudflare’s edge data centers. This post explains the problems it solves and how it works.
Security shouldn't wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle.
Dockerized local and offline backing up of PostgresQL with rotation and compression. - efrecon/pgbackup
Proton VPN gets better for Linux users.