Links
Add
CVE program faces swift end after DHS fails to renew contract. Leaving security flaw tracking in limbo
https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html
After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.
Added 1 month ago
The Top 10 Most Downloaded AWS Security and Compliance Documents in 2017 |
https://aws.amazon.com/blogs/security/the-top-10-most-downloaded-aws-security-and-compliance-documents-in-2017/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=top10downloadeds&cdocuments2017&sc_category=AWS_Identity_and_Access_Management&linkId=46616500
July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]
Dear Ai - make me a video about skateboarding with the boys? - YouTube
https://www.youtube.com/watch?v=NBYa0cTEyBc
Purple Knight Active Directory Security Assessment
https://www.purple-knight.com/
Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.
Added 1 month ago
Broken
Introduction to Circos Features and Uses // CIRCOS Circular Genome Data Vi
https://circos.ca/
Added 1 month ago
Broken
500 Free Movies Online: Great Classics Indies Noir Westerns & More
http://www.openculture.com/freemoviesonline
Watch 1,150 quality movies online. Includes classics, indies, film noir, documentaries showcasing the talent of our greatest actors, actresses and directors.
https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=82078481
https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&sc_campaign=AWSSecurity_Services&sc_publisher=TWITTER&sc_country=Security&sc_outcome=adoption&trk=AWSSecurity_Services_TWITTER&linkId=82078481
August 31, 2021:AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. Typically, when you protect data in Amazon Simple Storage Service (Amazon S3), you use a combination […]
Added 1 month ago
How to build a CI/CD pipeline for container vulnerability scanning with Tri
https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]
Added 1 month ago
openauthjs/openauth
https://github.com/openauthjs/openauth
▦ Universal, standards-based auth provider. Contribute to toolbeam/openauth development by creating an account on GitHub.
Added 1 month ago
Testing HashiCorp Terraform
https://www.hashicorp.com/blog/testing-hashicorp-terraform
Learn testing strategies for Terraform modules and configuration, and learn how to run tests against infrastructure.
Added 1 month ago
Broken
Rollergirls | Shot by Kern | VICE
http://www.vice.com/en_au/shot-by-kern/shot-by-kern-rollergirls-2
Added 1 month ago
I Still Use RSS
https://atthis.link/blog/2021/rss.html
Thinking about how we can make computing better.
Added 1 month ago
Bypassing airport security via SQL injection
https://ian.sh/tsa
We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation Security Administration.
Added 1 month ago
A First Glimpse of the Starlink User Ternimal
https://www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/
Added 1 month ago
Getting started with chaos engineering | Opensource.com
https://opensource.com/article/18/12/getting-started-chaos-engineering
Learn how to build more performant, safe, and secure systems with chaos engineering.
Added 1 month ago
Broken
How to Create an MSI Package - Tips & Tricks
http://create-msi.com/how-to-create-msi-package
This articles provides an overview of tools and approaches that can be used to create a MSI package. Advantages and benefits of every method are explained.
Added 1 month ago
CHART YOUR FART
https://research.csiro.au/cshw/projects/chart-your-fart/
We all fart! Some more than others! Some louder than others? Some smellier than others! And some funnier than others!
Watch "Enterprise DevOps: Applying ITIL to Rapid Innovation - AWS Online Te
https://youtu.be/6SmocpAsL94
DevOps enables rapid innovation but enterprises struggle to implement DevOps at scale because of the lack of governance, security and compliance. Enterprise ...
How to build a CI/CD pipeline with GitHub Actions in four simple steps | Th
https://github.blog/2022-02-02-build-ci-cd-pipeline-github-actions-four-steps/
Here’s a quick guide on the advantages of using GitHub Actions as your preferred CI/CD tool—and how to build a CI/CD pipeline with it.
Winamp really whips open source coders into frenzy with its source release
https://arstechnica.com/gadgets/2024/10/winamp-really-whips-open-source-coders-into-frenzy-with-its-source-release/
Winamp released its source code with a license that drew a lot of attention. That’s when other apps’ code was found inside.
Added 1 month ago
The Open Book Project: open-hardware e-ink eBook reader
https://news.ycombinator.com/item?id=28611205
Added 1 month ago
Added 1 month ago
Paul Butler – Smuggling arbitrary data through an emoji
https://paulbutler.org/2025/smuggling-arbitrary-data-through-an-emoji/
Added 1 month ago