How to respond to security reports
written by: molly ~ published on: Thursday 12 December 2024
guide cybersecurity vulnerability reporting incident protection incident response threat detection cyberattack prevention security audits security analysis penetration testing

CSRF exploits are still a thing
written by: yep ~ published on: Saturday 23 November 2024
csrf web vulnerability exploitation cybersecurity

Penetration Testing: How choose between Black Box, Gray Box, and White Box?
written by: molly ~ published on: Sunday 12 January 2025
guide cybersecurity pentesting reporting detection prevention security audits

Why MD5 is a Horrible Choice for Cybersecurity
written by: molly ~ published on: Saturday 30 November 2024
cybersecurity hashing security vulnerabilities brute-force collisions passwords integrity encryption algorithms databreach

Unlimited OpenAI tokens for free?
written by: molly ~ published on: Friday 13 December 2024
api leak openai llm prompt injection git secrets ci

JWT Tokens: How they work and how to securely implement them
written by: molly ~ published on: Friday 22 November 2024
web jwt auth crypto rsa security hmac tokens attacks vulnerability encryption exploitation cybersecurity