security
            Exploiting CI / CD Pipelines for fun and profit – Razz Security Blog
            
                    
        
        
                https://blog.razzsecurity.com/2024/09/08/exploitation-research/exploiting-ci-cd-pipelines-for-fun-and-profit/
            
        
                Added 5 months ago 
            
                            
            17 free AWS cybersecurity courses you can take right now - Help Net Securit
            
                    
        
        
                https://www.helpnetsecurity.com/2023/09/12/free-aws-cybersecurity-courses/
            
        
                Added 5 months ago 
            
                            
            Artifact Attestations is generally available
            
                    
        
        
                https://github.blog/changelog/2024-06-25-artifact-attestations-is-generally-available/
            
        
                Added 5 months ago 
            
                            
            Federate Kubernetes with AWS IAM using OIDC · reecetech
            
                    
        
        
                https://reece.tech/posts/oidc-k8s-to-aws/
            
        
                Added 5 months ago 
            
                            
            Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems
            
                    
        
        
                https://cybersecuritynews.com/critical-unauthenticated-rce-flaw/
            
        
                Added 5 months ago 
            
                            
            Headscale: Open-source implementation of the Tailscale control server
            
                    
        
        
                https://news.ycombinator.com/item?id=28572013
            
        
                Added 5 months ago 
            
                            
            aurae-runtime/aurae: Distributed systems runtime daemon written in Rust.
            
                    
        
        
                https://github.com/aurae-runtime/aurae
            
        
                Added 5 months ago 
            
                            
            https://duo.com/labs/research/how-to-monitor-github-for-secrets
            
                    
        
        
                https://duo.com/labs/research/how-to-monitor-github-for-secrets
            
        
                Added 5 months ago 
            
                            
            Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The Control Plane for Agentic Identity
            
                    
        
        
                https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
            
        
                Added 2 months ago 
            
                            
            https://cloud.vmware.com/vmware-essential-pks/resources#documents-papers
            
                    
        
        
                https://cloud.vmware.com/vmware-essential-pks/resources#documents-papers
            
        
                Added 5 months ago 
            
                            
            Spoofing Cell Networks with a USB to VGA Adapter | Hackaday
            
                    
        
        
                https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/
            
        
                Added 5 months ago 
            
                            
            Securing CI/CD workflows with Wazuh
            
                    
        
        
                https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html?m=1
            
        
                Added 5 months ago 
            
                            
            Introducing CodeMender: an AI agent for code security - Google DeepMind
            
                    
        
        
                https://deepmind.google/discover/blog/introducing-codemender-an-ai-agent-for-code-security/
            
        
                Added 3 weeks ago 
            
                            
            Purple Knight Active Directory Security Assessment
            
                    
        
        
                https://www.purple-knight.com/
            
        
                Added 5 months ago 
            
                            
            Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks
            
                    
        
        
                https://cybersecuritynews.com/open-source-firewall-pfsense-vulnerable/
            
        
                Added 5 months ago 
            
                            
            Analyze Database Audit Logs for Security and Compliance Using Amazon Redshi
            
                    
        
        
                https://aws.amazon.com/blogs/big-data/analyze-database-audit-logs-for-security-and-compliance-using-amazon-redshift-spectrum/?sc_channel=sm&sc_campaign=Big_Data_Blog&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=redshift-spectrum-blog-db-audit-logs-03&sc_category=Amazon_Redshift&linkId=46689077
            
        
                Added 5 months ago