Cybersecurity Guides Fundamentals Cybersecurity 101: Understanding MITRE ATT&CK Framework Traditional security frameworks often fail to connect with the realities of development. Usually, we see the results of… byAlex MNovember 25, 2024
Guides Backup Strategies for Home & Self-Hosted Solutions After setting up your self-hosted environment, establishing a solid backup strategy is important. This guide applies to home… byAlex MNovember 22, 2024
Cybersecurity Guides Web Application Security Web Security 101: Understanding Cross-Origin Resource Sharing (CORS) Continuing the web security headers series, after covering HSTS (Strict Transport Security), and CSP (Content Security Policy), now… byAlex MNovember 20, 2024
Innovation and Disruption Insights A Decade of Let’s Encrypt: From Complex Certs to One-Click Security Time passing is always constant, at least in the Newtonian classical world. Two days ago, on November 18,… byAlex MNovember 20, 2024
CyberWatch Incidents News Critical Authentication Bypass Found in Really Simple Security: 4M WordPress Sites at Risk Wordfence’s Threat Intelligence team has identified a critical authentication bypass vulnerability affecting over 4 million WordPress sites that… byAlex MNovember 19, 2024
Career Hub Cybersecurity Compliance Cyber Resilience Act: Security Requirements in Development On October 10th, 2024, the EU Parliament mandated security standards for connected software with the enactment of the… byAlex MNovember 18, 2024
Code & Platform CyberWatch Incidents News Security Patches PostgreSQL PL/Perl Vulnerability: ENV Variable Exploit & Dev Notes Researchers have discovered a high-severity vulnerability in PostgreSQL’s PL/Perl trusted language extension that could allow attackers to execute… byAlex MNovember 16, 2024
Cybersecurity Guides Web Application Security Web Security 101: Understanding Strict-Transport-Security Headers In this series of evaluating web security headers, we are now diving in with HSTS, the HTTP Strict-Transport-Security… byAlex MNovember 16, 2024
Cybersecurity Guides Fundamentals Introduction to Offensive Security – The Ethics and Legality of Cybersecurity Offensive security practices like penetration testing and red teaming are used to identify and address vulnerabilities before malicious… byAlex MNovember 15, 2024
Cybersecurity Guides Web Application Security Web Security 101: Understanding Content Security Policy Headers (CSP) Content security policy (CSP) is a browser feature that can help minimize the risk of a multitude of… byAlex MNovember 11, 2024