Vikas Chawla“Unsubscribe” as a way to inject malwareFirstly, a little about myself. I have worked in enterprise infrastructure most of my career and have a good foundational knowledge about…2 min read·1 day ago--
Ike Gabriel YusoninTowards AWSHow serverless security shifts to the leftImagine not managing and provisioning servers. Imagine only focusing on deploying code and not worrying about infrastructure.7 min read·Apr 30, 2024--1
Maciej PocwierzHow an empty S3 bucket can make your AWS bill explodeImagine you create an empty, private AWS S3 bucket in a region of your preference. What will your AWS bill be the next morning?4 min read·Apr 29, 2024--135--135
Vishal ChaudharyExploiting Buffer Overflow for Remote Code ExecutionYeah this can be hard to understand, I will try my best to make this as simple as possible, how I exploited this vulnerability and how you…6 min read·17 hours ago----
Cristian DobreinLevel Up CodingHow to Measure and Audit Bot Traffic by HTTP Request LogsAnalyse NGINX logs using Python·5 min read·Apr 14, 2024--1--1
Vikas Chawla“Unsubscribe” as a way to inject malwareFirstly, a little about myself. I have worked in enterprise infrastructure most of my career and have a good foundational knowledge about…2 min read·1 day ago--
Ike Gabriel YusoninTowards AWSHow serverless security shifts to the leftImagine not managing and provisioning servers. Imagine only focusing on deploying code and not worrying about infrastructure.7 min read·Apr 30, 2024--1
Maciej PocwierzHow an empty S3 bucket can make your AWS bill explodeImagine you create an empty, private AWS S3 bucket in a region of your preference. What will your AWS bill be the next morning?4 min read·Apr 29, 2024--135
Vishal ChaudharyExploiting Buffer Overflow for Remote Code ExecutionYeah this can be hard to understand, I will try my best to make this as simple as possible, how I exploited this vulnerability and how you…6 min read·17 hours ago--
Cristian DobreinLevel Up CodingHow to Measure and Audit Bot Traffic by HTTP Request LogsAnalyse NGINX logs using Python·5 min read·Apr 14, 2024--1
LORYA basic question in security Interview: How do you store passwords in the database?Explained in 3 mins.·7 min read·6 days ago--1
Shlomi Boutnaru, Ph.D.The Linux Concept Journey — “User Namespaces”In general, “User Namespace” is a feature of the Linux kernel which allows isolation of group/user identifiers mapping. By using this…2 min read·22 hours ago--
Artem LajkoinITNEXTOptimize Your Kubernetes Resources with Azure IAM: Managed vs. Workload IdentityUnveiling the Best Identity Solution for Your Azure Kubernetes Service (AKS) Deployments9 min read·Apr 3, 2024--1