Links
AddGet an exclusive look at brand new cartoons and artwork from cartoonist Gary Larson, creator of the iconic comic strip The Far Side®.
Safely shareable TLS root CA for .internal networks using Name Constraints - nh2/internal-contstrained-pki
Today, the National Institute of Standards and Technology (NIST) announced the first standardization of three cryptography schemes that are immune against the threat of quantum computers, known as post-quantum cryptography (PQC) schemes. With these standards, NIST is encouraging computer system administrators to transition as soon as possible.
Four related algorithms are now ready for use to protect data created and transmitted by the Internet of Things and other electronics
The examples use off-the-shelf commercial technologies, giving organizations valuable starting points
Nobl9 has released an open specification for defining SLOs and, in addition, has defined a repeatable SLO methodology.
There is a need to evaluate the effectiveness of non-pharmacological treatment options to guide Australian clinicians and people with ADHD when choosing appropriate evidence-based intervention options.
My day was completely ruined yesterday when I stumbled upon a fun fact that absolutely obliterated my mind. I saw this tweet yesterday that said that not everyone has an internal monologue in their head. All my life, I could hear my voice in my head and speak in full sentences as if I was…
Update: The date for closing down the Ubuntu 20 image has changed to April 15. The following post has been updated to reflect this change. Ubuntu-latest upcoming breaking changes We…
In the first of a new series focusing on DevOps monitoring tools, we review the various types of system observability tools.
Nuclei is a fast and customizable open-source vulnerability scanner powered by YAML-based templates. With its flexible templating system, Nuclei can be
In the final section of my series on creating a comprehensive security program around Docker [https://nullsweep.com/building-a-docker-security-program], I'll be looking at some ideas and best practices around patching running containers.
In the previous articles, I talked about running static analysis on containers [https://nullsweep.com/docker-static-analysis-with-clair] and rolling
Hmmm ... I'm not sure about this. It's interesting, but I'm not yet convinced about it's place.
Observability 2.0 centers around “wide events,” breaking down the silos between metrics, logs, and traces. This article outlines the core ideas and technical challenges of this new paradigm, and introduces how GreptimeDB, a native open-source database for wide events, provides a unified and efficient foundation for next-gen observability platforms.
Download once:radix for free. once:radix is a Rapid Application Development system for Intranet and eXtranet environments. Create advanced database-driven web applications that require no expertise in the underlying technologies.
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.