Links
Add
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
https://cybersecuritynews.com/kali-gpt/
Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike.
How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
Added 1 month ago
New AWS Security Incident Response helps organizations respond to and recover from security events |
https://aws.amazon.com/blogs/aws/new-aws-security-incident-response-helps-organizations-respond-to-and-recover-from-security-events/
AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.
Added 1 month ago
Apache ECharts
https://echarts.apache.org/en/index.html
Apache ECharts, a powerful, interactive charting and visualization library for browser
Added 1 month ago
Learn git concepts not commands - DEV Community
https://riedmann.dev/2019/06/02/GitGud.html
Added 1 month ago
Jazz² Resurrection: Open-source Jazz Jackrabbit 2 reimplementation
http://deat.tk/jazz2/
Open-source Jazz Jackrabbit 2 reimplementation for Windows, Linux, macOS and Android
Added 1 month ago
TIP: SSH add a tunnel to a running session ·
https://edmondscommerce.github.io/bash/tip-ssh-add-a-tunnel-to-a-running-session.html
Added 1 month ago
Ensure the quality of your Docker Images with these cool tools - DEV Commun
https://dev.to/brpaz/ensure-the-quality-of-your-docker-images-with-these-cool-tools-1bh7
In this article, I will present some cool tools that can be used to test and ensure the quality of your Docker image. Tagged with testing, docker.
Added 1 month ago
Visprex
https://www.visprex.com/
Visualise your CSV files in seconds without sending your data anywhere
Added 1 month ago
Enhancing your DevSecOps with Wazuh. The open source XDR platform
https://www.bleepingcomputer.com/news/security/enhancing-your-devsecops-with-wazuh-the-open-source-xdr-platform/
Security shouldn't wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle.
https://srcco.de/posts/using-obs-studio-with-v4l2-for-google-hangouts-meet.html
https://srcco.de/posts/using-obs-studio-with-v4l2-for-google-hangouts-meet.html
Thread by @bettersafetynet on Thread Reader App – Thread Reader App
https://threadreaderapp.com/thread/1496496087741480960.html
@bettersafetynet: I've had 3 calls so far today (it's not even 10) about defending against Russian cyber ops I'm tired of having the same call... so... here's what I've told everyone. This is the playbook you...…
Added 1 month ago
Added 1 month ago
Sleep regularity is a stronger predictor of mortality risk than sleep duration: A prospective cohort
https://academic.oup.com/sleep/article/47/1/zsad253/7280269?login=false
NIST releases open-source platform for AI safety testing | SC Media
https://www.scmagazine.com/news/nist-releases-open-source-platform-for-ai-safety-testing
dns recon & research -find & lookup dns records
https://dnsdumpster.com/
Free domain research tool to discover hosts related to a domain. Find visible hosts from the attackers perspective for Red and Blue Teams.
Gaslight-driven development @ tonsky.me
https://tonsky.me/blog/gaslight-driven-development/
Computers are starting to have opinions on how our APIs should look like
Added 17 hours ago
FrigadeHQ/trench
https://github.com/FrigadeHQ/trench
Trench — Open-Source Analytics Infrastructure. A single production-ready Docker image built on ClickHouse, Kafka, and Node.js for tracking events, page views. Easily build product analytics dashboards, LLM RAGs, observability platforms, or any other analytics product. - FrigadeHQ/trench
Added 1 month ago
CISA extends funding to ensure 'no lapse in critical CVE services'
https://www.bleepingcomputer.com/news/security/cisa-extends-funding-to-ensure-no-lapse-in-critical-cve-services/
CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.
Added 1 month ago
Non-Pharmacological ADHD Treatment - Australian ADHD Clinical Practice Guid
https://adhdguideline.aadpa.com.au/non-pharmacological/
There is a need to evaluate the effectiveness of non-pharmacological treatment options to guide Australian clinicians and people with ADHD when choosing appropriate evidence-based intervention options.
Have You Tried Building Your Own TV Channels in Plex?
https://gizmodo.com/have-you-tried-building-your-own-tv-channels-in-plex-1844703597
A wise colleague once told me I should never have anything on in the background just to have it on. He’s probably right, but I still like to pop on a show
Added 1 month ago
GitHub - cloud-custodian/cloud-custodian: Rules engine for cloud security
https://github.com/cloud-custodian/cloud-custodian
Rules engine for cloud security, cost optimization, and governance, DSL in yaml for policies to query, filter, and take actions on resources - cloud-custodian/cloud-custodian
Added 1 month ago
Broken
CS 193P iPhone Application Development
http://www.stanford.edu/class/cs193p/cgi-bin/drupal/
Added 1 month ago
Scammers impersonating the ASD's ACSC | Cyber.gov.au
https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/email-scammers-impersonating-asds-acsc
Scammers are impersonating the ASD's ACSC sending out phishing emails to the public with the email content suggesting to download a malicious antivirus program.