Tagged | security
-
Improving Web Vulnerability Management through Automation
(eng.lyft.com) -
Biometric authentication - Why do we need it?
(engineering.grab.com)#software-engineering #software-architecture #security #auth
-
How our content abuse defense systems work to keep members safe
(engineering.linkedin.com) -
Presentation: Getting the Most Out of Sandboxing
(www.infoq.com) -
Secure your Kubernetes deployments with eBPF
(developers.redhat.com) -
Snaring the Bad Folks
(netflixtechblog.com) -
How We Used eBPF to Build Programmable Packet Filtering in Magic Firewall
(blog.cloudflare.com) -
Permissions, Privileges, and Scopes
(auth0.com) -
The Case of the Recursive Resolvers
(slack.engineering) -
How Two Interns Are Helping Secure Millions of Lines of Code
(slack.engineering) -
Continuous Container Vulnerability Testing with Trivy
(semaphoreci.com) -
Malware analysis: Hands-On Shellbot malware
(sysdig.com) -
Meet Ottr: A Serverless Public Key Infrastructure Framework
(medium.com)#software-engineering #software-architecture #infra #security
-
Distributed Firewall (DFW): Network security at the host level at LinkedIn
(engineering.linkedin.com) -
Powering Security Reports with Cartography and Flyte
(eng.lyft.com) -
Revisiting BetterTLS: Certificate Path Building
(netflixtechblog.com) -
Threat modeling the Kubernetes Agent: from MVC to continuous improvement
(about.gitlab.com) -
Open-sourcing Mariana Trench: Analyzing Android and Java app security in depth
(engineering.fb.com) -
The Show Must Go On: Securing Netflix Studios At Scale
(netflixtechblog.com) -
Enforcing encryption at scale
(research.fb.com) -
How WhatsApp enables multi-device capability
(engineering.fb.com) -
Enforcing encryption at scale
(engineering.fb.com) -
Practical CPU time performance tuning for security software: Part 2
(www.elastic.co) -
Developers Guide to GPG and YubiKey
(developer.okta.com) -
Presentation: User Adaptive Security
(www.infoq.com) -
Measuring Security Risks in Open Source Software: Scorecards Launches V2
(security.googleblog.com) -
Practical CPU time performance tuning for security software: Part 1
(www.elastic.co) -
How We Protect Pinners’ Passwords
(medium.com)#software-engineering #software-architecture #security #auth
-
Introducing SLSA, an End-to-End Framework for Supply Chain Integrity
(security.googleblog.com) -
Slack Details Its New Role Management Architecture
(www.infoq.com) -
How Clever Secures Infrastructure Secrets Using AWS SSM Parameter Store
(engineering.clever.com) -
A deep dive into how we investigate and secure GitLab packages
(about.gitlab.com) -
Making Leaked Credentials Useless for Attackers
(product.hubspot.com) -
Introducing Half-Double: New hammering technique for DRAM Rowhammer bug
(security.googleblog.com) -
Introducing Firefox’s new Site Isolation Security Architecture
(hacks.mozilla.org) -
Building Better IAM with a Scale-Out, OLTP Database
(www.cockroachlabs.com) -
Mostly harmless: An account of pseudo-normal floating point numbers
(developers.redhat.com) -
Of Protocols and Pythons
(galois.com) -
Enabling Hardware-enforced Stack Protection (cetcompat) in Chrome
(security.googleblog.com) -
Himeji: a scalable centralized system for authorization at Airbnb
(medium.com) -
Rust in the Linux kernel
(security.googleblog.com) -
A Zero Trust terminal in your web browser
(blog.cloudflare.com) -
Extending systemd Security Features with eBPF
(kinvolk.io) -
Cloud lateral movement: Breaking in through a vulnerable container
(sysdig.com) -
Evolving Container Security With Linux User Namespaces
(netflixtechblog.com) -
Beat - An Acoustics Inspired DDoS Attack
(blog.cloudflare.com) -
Security and performance tips and tricks for your GraphQL servers
(blog.logrocket.com) -
Presentation: Making Npm Install Safe
(www.infoq.com) -
Behind the scenes: building a dynamic instrumentation agent for Go
(blog.sqreen.com) -
Analysis of Computer Vision Techniques in Malware Classification
(towardsdatascience.com) -
Preventing Fraud and Fighting Account Takeovers with Kafka Streams
(www.confluent.io)#data-pipeline #software-architecture #security #distributed-systems
-
Rolling With The Punches: Shifting Attack Tactics & Dropping Packets Faster & Cheaper At The Edge
(blog.cloudflare.com) -
We Built a Plugin, but It’s Not a Secret
(open.nytimes.com) -
Building Secure Docker Images - 101
(medium.com) -
Presentation: Exploiting Common iOS Apps’ Vulnerabilities
(www.infoq.com) -
Doing AES/GCM in Android: adventures in the field
(levelup.gitconnected.com) -
How to exploit parser differentials
(about.gitlab.com) -
Providing User Privacy Rights through the California Consumer Protection Act
(eng.lyft.com) -
Speeding up Linux disk encryption
(blog.cloudflare.com) -
Security Patterns for Microservice Architectures
(developer.okta.com) -
Presentation: Securing Your CI/CD Pipeline
(www.infoq.com) -
Open-Sourcing riskquant, a library for quantifying risk
(netflixtechblog.com) -
Data Encryption on Android with Jetpack Security
(android-developers.googleblog.com) -
Introducing The API Security Maturity Model
(nordicapis.com) -
Securing Firefox with WebAssembly
(hacks.mozilla.org) -
Presentation: Small Is Beautiful: How to Improve Security by Maintaining Less Code
(www.infoq.com) -
Using your devices as the key to your apps
(blog.cloudflare.com) -
Presentation: Secure IoT Command, Control, and Exfil with Apache MiNiFi
(www.infoq.com) -
Playing defense against Gamaredon Group
(www.elastic.co) -
Presentation: Managing Privacy & Data Governance for Next Generation Architecture
(www.infoq.com)#software-engineering #software-architecture #security #privacy
-
Never Build MFA Again: A Developer's Guide to Transactional MFA
(developer.okta.com) -
Understanding filesystem takeover vulnerabilities in npm JavaScript package manager
(snyk.io) -
Automated IDOR Discovery through Stateful Swagger Fuzzing
(engineeringblog.yelp.com) -
Presentation: Secrets at Planet-scale: Engineering the Internal Google KMS
(www.infoq.com) -
Safe ACL Change through Model-based Analysis
(tech.ebayinc.com) -
How Docker Authentication Works: By Documentation, MITM, and Implementation
(levelup.gitconnected.com) -
PHA Family Highlights: Bread (and Friends)
(security.googleblog.com) -
JWT Architecture for Modern Apps
(levelup.gitconnected.com) -
Finding Evil on the Network Using JA3/S and HASSH
(engineering.salesforce.com) -
Salesforce Cloud Security: Automating Least Privilege in AWS IAM with Policy Sentry
(engineering.salesforce.com) -
Cloudflare + Remote Browser Isolation
(blog.cloudflare.com) -
Can We Build Trustable Hardware?
(www.infoq.com) -
How to Implement a Secure Central Authentication Service in Six Steps
(engineering.shopify.com) -
Securing and centrally monitoring accounts in Amazon Web Services
(www.theguardian.com) -
Presentation: User & Device Identity for Microservices @ Netflix Scale
(www.infoq.com)#software-architecture #scaling #security #microservices #auth
-
Protecting programmatic access to user data with Binary Authorization for Borg
(security.googleblog.com) -
How CloudSponge Protects Trillions Of Email Addresses From Hackers And Scammers Every Year
(stackshare.io)#software-engineering #software-architecture #security #privacy
-
Better password protections in Chrome - How it works
(security.googleblog.com) -
How to tell secrets
(www.thoughtworks.com) -
MySQL Encryption: Talking About Keyrings
(www.percona.com) -
Presentation: Securing Software from the Supply Side
(www.infoq.com) -
Lessons learned from handling JWT on mobile
(tech.just-eat.com) -
ESP32 IoT Devices Vulnerable to Forever-Hack
(www.infoq.com) -
Shopping for an admin account via path traversal
(about.gitlab.com) -
Organizing and Securing Third-Party CDN Assets at Yelp
(engineeringblog.yelp.com) -
Introducing Flan Scan: Cloudflare’s Lightweight Network Vulnerability Scanner
(blog.cloudflare.com) -
G-Scout Enterprise and Cloud Security at Etsy
(codeascraft.com) -
Push Notifications-based 2-step Verification
(tech.ebayinc.com) -
Privacy Power-Up: Upgrading Pin Links from HTTP to HTTPS
(medium.com) -
How Salesforce Protects You From Credential Stuffers
(engineering.salesforce.com) -
Protecting against code reuse in the Linux kernel with Shadow Call Stack
(security.googleblog.com) -
How We Sustain DNS Outages at Grofers
(lambda.grofers.com) -
JavaScript frameworks security report 2019
(snyk.io) -
Going Keyless Everywhere
(blog.cloudflare.com) -
Presentation: Securing a Multi-tenant Kubernetes Cluster
(www.infoq.com) -
Delegated Credentials for TLS
(blog.cloudflare.com) -
Multi-cluster security with Falco and AWS Firelens on EKS & ECS
(sysdig.com) -
Announcing cfnts: Cloudflare's implementation of NTS in Rust
(blog.cloudflare.com) -
DNS Encryption Explained
(blog.cloudflare.com) -
Presentation: Maintaining the Go Crypto Libraries
(www.infoq.com)#software-engineering #security #practices #GoLang #encryption
-
Public keys are not enough for SSH security
(blog.cloudflare.com) -
Securing Apache Airflow UI With DAG Level Access
(eng.lyft.com) -
3 steps toward improving container security
(developers.redhat.com) -
Fighting fraud using partially blind signatures
(engineering.fb.com) -
Zero Trust at GitLab: Where do we go from here?
(about.gitlab.com) -
How Dropbox Security builds tools for threat detection and incident response
(blogs.dropbox.com) -
Federated Learning
(towardsdatascience.com) -
Zero Trust at GitLab: Implementation challenges (and a few solutions)
(about.gitlab.com) -
How to build a WAF at the application layer
(blog.sqreen.com) -
Apotheosis: A GCP Privilege Escalation Tool
(codeascraft.com) -
The Technical Challenges of Building Cloudflare WARP
(blog.cloudflare.com) -
Presentation: Modern WAF Bypass Scripting Techniques for Autonomous Attacks
(www.infoq.com) -
Everything you wanted to know about addressing security vulnerabilities in Linux-based containers
(snyk.io) -
How Google adopted BeyondCorp: Part 3 (tiered access)
(security.googleblog.com) -
Adventures in the TCP stack: Uncovering performance regressions in the TCP SACKs vulnerability fixes
(databricks.com) -
eBay OAuth Client Library in Python and Best Practices
(tech.ebayinc.com) -
Why Public Key Cryptography Matters
(developer.okta.com) -
Developer security best practices: protecting against timing attacks
(blog.sqreen.com) -
Verifying Service Mesh TLS in Kubernetes, Using ksniff and Wireshark
(itnext.io) -
Securing REST APIs
(developer.okta.com) -
Developing Shellcode for IoT: A Password-Protected Reverse Shell for ARM Processors
(hackernoon.com) -
Combat Side-Channel Attacks with Cross-Origin Read Blocking
(developer.okta.com) -
Kubernetes security best practices
(blog.sqreen.com) -
Top 10 security traps to avoid when migrating from a monolith to microservices
(blog.sqreen.com) -
Zoncolan: How Facebook uses static analysis to detect and prevent security issues
(engineering.fb.com) -
Seccomp in the Elastic Stack
(www.elastic.co) -
Article: Privacy Attacks on Machine Learning Models
(www.infoq.com)#data-science #machine-learning #security #research #privacy
-
Top 10 Security Best Practices for MongoDB
(blog.sqreen.com) -
Implementing Continuous Security for Microservices and Kubernetes
(www.infoq.com) -
The Hardest Thing About Data Encryption
(developer.okta.com) -
Picture Perfect: How JPG EXIF Data Hides Malware
(umbrella.cisco.com) -
How we stopped vulnerable code from landing in production
(blog.developer.atlassian.com) -
Container Security: A Developer Guide
(developer.okta.com) -
A Tale of Two (APT) Transports
(blog.cloudflare.com) -
Docker Security Considerations Part I
(www.percona.com) -
Zoncolan: How Facebook uses static analysis to detect and prevent security issues
(code.fb.com) -
A gentle introduction to Linux Kernel fuzzing
(blog.cloudflare.com) -
Introducing CIRCL: An Advanced Cryptographic Library
(blog.cloudflare.com) -
Cryptography For Software Engineers
(hackernoon.com) -
Key Conjurer: Our Policy of Least Privilege
(technology.riotgames.com) -
Presentation: Securing Services Using SSO
(www.infoq.com) -
Article: NotPetya Retrospective
(www.infoq.com) -
How Google adopted BeyondCorp
(security.googleblog.com) -
Towards Post-Quantum Cryptography in TLS
(blog.cloudflare.com)#security #systems #cryptography #encryption #quantum-computing
-
Helping organizations do more without collecting more data
(security.googleblog.com) -
Securing Certificate Issuance using Multipath Domain Control Validation
(blog.cloudflare.com) -
Podcast: Johnny Xmas on Web Security & the Anatomy of a Hack
(www.infoq.com) -
Another one bites the apple!
(engineering.linecorp.com) -
Protecting Project Galileo websites from HTTP attacks
(blog.cloudflare.com) -
Introduction to Kubernetes Security
(www.weave.works) -
Evolving to Enterprise-Grade Permissions
(benchling.engineering)#software-engineering #software-design #software-architecture #security #access-control
-
PHA Family Highlights: Triada
(security.googleblog.com) -
Presentation: Powering Flexible Payments in the Cloud with Kubernetes
(www.infoq.com)#software-architecture #security #microservices #kubernetes #cloud
-
A Practical Guide to Building Secure SSO
(engineering.gusto.com) -
Building Facebook’s service encryption infrastructure
(code.fb.com) -
How We Improved our Node.js Application Security Grade from F to A
(itnext.io) -
Empowering User Privacy and Decentralizing IoT with Mozilla WebThings
(hacks.mozilla.org) -
Queue the Hardening Enhancements
(android-developers.googleblog.com) -
Securing Third-Party Applications at Scale
(engineering.salesforce.com) -
Presentation: The Evolving Practice of Security
(www.infoq.com) -
Securing GitOps Pipelines
(www.weave.works) -
Presentation: Reducing Risk of Credential Compromise @Netflix
(www.infoq.com) -
Shamir Secret Sharing vs Multi-sig
(hackernoon.com) -
The Android Platform Security Model
(security.googleblog.com) -
Understanding Subresource Integrity
(www.smashingmagazine.com) -
The evolution of Zero Trust
(about.gitlab.com) -
Securing Developer Workflows
(www.weave.works) -
How to fully leverage your pentest
(blog.sqreen.com) -
Presentation: Fine-grained Sandboxing with V8 Isolates
(www.infoq.com) -
BoringTun, a userspace WireGuard implementation in Rust
(blog.cloudflare.com) -
Presentation: Secure Isolation in Rust: Hypervisors, Containers, and the Future of Composable Infrastructure
(www.infoq.com) -
Monsters in the Middleboxes: Introducing Two New Tools for Detecting HTTPS Interception
(blog.cloudflare.com) -
Open-sourcing Sandboxed API
(security.googleblog.com) -
Presentation: Developer Secure Containers for the Cyberspace Battlefield
(www.infoq.com) -
Securing third-party calls by using CSRF protection
(tech.showmax.com) -
Presentation: The Most Secure Program Is One That Doesn’t Exist
(www.infoq.com) -
Single-page applications need better auditing
(blog.sqreen.com) -
What is Identity Infrastructure?
(auth0.com) -
Ten Ways to Secure your Applications
(blog.heroku.com) -
Stop the Bots: Practical Lessons in Machine Learning
(blog.cloudflare.com) -
User Migration: The Definitive Guide
(developer.okta.com) -
Introducing Adiantum: Encryption for the Next Billion Users
(security.googleblog.com) -
Open sourcing ClusterFuzz
(security.googleblog.com) -
Distributed PKI: Development and Use Cases
(hackernoon.com) -
How Radix trees made blocking IPs 5000 times faster
(blog.sqreen.io) -
TLS Fingerprinting with JA3 and JA3S
(engineering.salesforce.com) -
Managing Secrets in Kubernetes
(www.weave.works) -
PHA Family Highlights: Zen and its cousins
(security.googleblog.com) -
Reverse Engineering an Obfuscated Malicious Macro
(medium.com) -
Keep your infrastructure keys safe with Vault
(blog.octo.com) -
Presentation: Connecting, Managing, Observing, and Securing Services
(www.infoq.com)#software-architecture #security #microservices #best-practices
-
Presentation: Securing Microservices in Hybrid Cloud
(www.infoq.com) -
DNS over TLS: Encrypting DNS end-to-end
(code.fb.com) -
Android Pie à la mode: Security & Privacy
(android-developers.googleblog.com) -
Security Considerations for Container Runtimes
(developers.redhat.com) -
Scaling secure tunnels for browser testing
(medium.com) -
Protecting Your Site With Feature Policy
(www.smashingmagazine.com) -
Netflix Information Security: Preventing Credential Compromise in AWS
(medium.com) -
Everything You Ever Wanted To Know About Authentication at Artsy (But Didn't Know How To Ask)
(artsy.github.io) -
L4Drop: XDP DDoS Mitigations
(blog.cloudflare.com) -
5 Ways To Hack An API (And How To Defend)
(nordicapis.com) -
TTL as a Service: Automatic Revocation of Stale Privileges
(engineeringblog.yelp.com)#software-engineering #software-design #security #access-control
-
Offensive testing to make Dropbox (and the world) a safer place
(blogs.dropbox.com) -
Combating Potentially Harmful Applications with Machine Learning at Google: Datasets and Models
(android-developers.googleblog.com) -
Sinkholing - Face the Threat, Beat the Threat
(tech.showmax.com) -
Private by Design: How we built Firefox Sync
(hacks.mozilla.org) -
Cloud Computing without Containers
(blog.cloudflare.com) -
The rise of multivector DDoS attacks
(blog.cloudflare.com) -
Three Simple Rules for Putting Secrets into Git
(engineering.udacity.com) -
Presentation: Making Security Usable: Product Engineer Perspective
(www.infoq.com) -
How S3 Signed URLs work
(advancedweb.hu) -
Sharing Secrets with GPG
(8thlight.com) -
A tour through the OWASP Top 10
(auth0.com) -
Stolen Access Tokens and You
(developer.okta.com) -
Enabling ECC on PC Engines platforms
(3mdeb.com) -
Building a Titan: Better security through a tiny chip
(android-developers.googleblog.com) -
SqR00t Offensive Security Tech Talks
(medium.com) -
Client Side Encryption in Firebase Database and Storage
(hackernoon.com) -
VBA Stomping — Advanced Maldoc Techniques
(medium.com) -
Sinkholing - Face the Threat, Beat the Threat
(tech.showmax.com) -
Machine Learning for Cybersecurity 101
(towardsdatascience.com) -
Presentation: Introduction to gVisor: Sandboxed Linux Container Runtime
(www.infoq.com) -
Risk Detection Infrastructure @ Postmates
(blog.postmates.com) -
Roughtime: Securing Time with Digital Signatures
(blog.cloudflare.com) -
RPKI - The required cryptographic upgrade to BGP routing
(blog.cloudflare.com) -
Production Secret Management at Airbnb
(medium.com) -
Scalable User Privacy
(labs.spotify.com) -
Presentation: CI/CD/CS: Implementing Continuous Security Across Your Delivery Pipeline and at Run-time
(www.infoq.com) -
On The Nature of OAuth2’s Scopes
(auth0.com) -
Applying Seccomp Filters at Runtime for Go Binaries
(blog.heroku.com) -
Presentation: ML Data Pipelines for Real-time Fraud Prevention @PayPal
(www.infoq.com) -
An OAuth 2.0 introduction for beginners
(itnext.io) -
WebAssembly vs. the world. Should you use WebAssembly?
(blog.sqreen.io) -
Explain Like I'm Five: Poison Records (Honeypots for Database Tables)
(hackernoon.com) -
Entering God Mode — The Kernel Space Mirroring Attack
(hackernoon.com) -
Presentation: Using Blockchain Routing to Bring Best of Breed Cybersecurity to the Masses
(www.infoq.com) -
How We Improved Information Security at Grofers
(lambda.grofers.com) -
A Detailed Look at RFC 8446 (a.k.a. TLS 1.3)
(blog.cloudflare.com) -
Netflix Cloud Security: Detecting Credential Compromise in AWS
(medium.com) -
How to crash an email server with a single email
(snyk.io) -
Understanding Program Memories — from exploitation point of view
(medium.com) -
Securing New Products at Clever
(engineering.clever.com) -
Netflix SIRT releases Diffy: A Differencing Engine for Digital Forensics in the Cloud
(medium.com) -
Docker Image Scanning – How to Implement Open Source Container Security (Part 2)
(sysdig.com) -
How to Implement Open Source Container Security: Part 1 Runtime Security
(sysdig.com) -
Mitigating Spectre with Site Isolation in Chrome
(security.googleblog.com) -
Privilege escalation
(www.future-processing.pl) -
Presentation: Unikraft - Unleashing the Power of Unikernels
(www.infoq.com) -
Responsible IoT design
(www.oreilly.com) -
Compiler-based security mitigations in Android P
(android-developers.googleblog.com) -
Innovating on Authentication Standards
(yahooeng.tumblr.com) -
Malware Analysis: Kardon Loader
(engineering.salesforce.com) -
Satan Ransomware Spawns New Methods to Spread
(hackernoon.com) -
What Happens If Your JWT Is Stolen?
(developer.okta.com) -
Malware Analysis: Decoding Emotet, Part 1
(engineering.salesforce.com) -
Splitting your secrets with Shamir’s Secret Sharing Scheme
(www.future-processing.pl) -
Stick with security: YubiKey, SSH, GnuPG, macOS
(evilmartians.com) -
Presentation: Insecure Transit - Microservice Security
(www.infoq.com) -
Forcing a device to disconnect from WiFi using a deauthentication attack
(hackernoon.com) -
A cartoon intro to DNS over HTTPS
(hacks.mozilla.org) -
Applying security to the Twelve-Factor App
(hackernoon.com) -
Keeping 2 billion Android devices safe with machine learning
(android-developers.googleblog.com) -
Secure NPM
(hackernoon.com) -
Stepping Towards a Password-Free World
(www.ebayinc.com) -
The web is broken; let’s fix it
(www.oreilly.com) -
Binary Exploitation ELI5– Part 1
(hackernoon.com) -
Kubernetes Security Guide, Chapter 3. Securing Kubernetes components: kubelet, etcd and Docker registry
(sysdig.com) -
BGP leaks and cryptocurrencies
(blog.cloudflare.com) -
10 tips to power-up your Java security
(medium.com) -
Towards unprivileged container builds
(kinvolk.io) -
Web Security for Single Page Applications: great impact with little effort
(techblog.commercetools.com) -
Active Directory Password Blacklisting
(engineeringblog.yelp.com) -
Common Threats in Web Application Security
(auth0.com) -
How JavaScript Works: Inside the Networking Layer + How to Optimize Its Performance and Security
(blog.sessionstack.com) -
A Look at The Draft for JWT Best Current Practices
(auth0.com) -
Kubernetes Security guide
(sysdig.com) -
QuantLoader: An In-Depth Malware Analysis
(engineering.salesforce.com) -
Using CD with machine learning models to tackle fraud
(www.thoughtworks.com) -
A Solution to Compression Oracles on the Web
(blog.cloudflare.com) -
A House of Cards: An Exploration of Security When Building Docker Containers
(blog.heroku.com) -
Buffer overflow in PJSIP, a VoIP open source library
(engineering.linecorp.com) -
What devs need to know about Encoding / Encryption / Hashing / Salting / Stretching
(hackernoon.com) -
The dramatic impersonation : a developer horror tale
(hackernoon.com) -
Mechanisms Securing Blockchain Data
(towardsdatascience.com) -
How Developers got Password Security so Wrong
(blog.cloudflare.com) -
Validating Leaked Passwords with k-Anonymity
(blog.cloudflare.com) -
What every web app developer must know about security
(medium.com) -
A technical deep dive on Meltdown and does it work?
(hackernoon.com) -
Integrating continuous testing for improved open source security
(www.oreilly.com) -
Be fast, be secure, be accessible
(www.oreilly.com) -
Mitigating known security risks in open source libraries
(www.oreilly.com) -
Improving security of your web application with Security Headers
(www.future-processing.pl) -
ProxySQL Firewalling
(www.percona.com) -
Finding vulnerable open source packages
(www.oreilly.com) -
However improbable: The story of a processor bug
(blog.cloudflare.com) -
How machine learning can be used to write more secure computer programs
(www.oreilly.com)#machine-learning #programming-languages #security #research #podcast
-
Exploiting Spectre with Deep learning
(hackernoon.com) -
Concolic Execution and Code Coverage with Triton
(engineering.salesforce.com) -
The Spectre of the Zygote
(hackernoon.com) -
Cloud Native Part 6: Security
(blog.codeship.com) -
An Explanation of the Meltdown/Spectre Bugs for a Non-Technical Audience
(blog.cloudflare.com) -
WebSpellChecker Stack Buffer Overflow
(engineering.salesforce.com) -
I’m harvesting credit card numbers and passwords from your site. Here’s how.
(hackernoon.com) -
Dealing with the Meltdown patch at Grab
(engineering.grab.com) -
Today's CPU vulnerability: what you need to know
(security.googleblog.com) -
Fishing for Hackers 2 – Kubernetes Boogaloo
(sysdig.com) -
Meraki RCE: When Red Team and Vulnerability Research fell in love
(engineering.salesforce.com) -
How "expensive" is crypto anyway?
(blog.cloudflare.com) -
TLS 1.3 is going to save us all, and other reasons why IoT is still insecure
(blog.cloudflare.com) -
Revolution and Evolution: Fully Homomorphic Encryption
(galois.com) -
Keeping Yelp two steps ahead: How we built GSET to protect employee email
(engineeringblog.yelp.com) -
Mounting Mining Mayhem
(umbrella.cisco.com) -
Security for Static Websites
(blog.sqreen.io) -
Inside the infamous Mirai IoT Botnet: A Retrospective Analysis
(blog.cloudflare.com) -
Securing communications between Google services with Application Layer Transport Security
(security.googleblog.com) -
The Definitive Guide to Container Security Terminology
(sysdig.com) -
Securing Medical IoT Devices
(nordicapis.com) -
Why Some Phishing Emails Are Mysteriously Disappearing
(blog.cloudflare.com) -
How RSA Works: TLS Foundations
(fly.io) -
DDoS Attack Detection with Wallaroo: A Real-time Time Series Analysis Example
(blog.wallaroolabs.com) -
The Evolution of Security at Riot
(engineering.riotgames.com) -
Kubernetes Security: How to harden internal kube-system services
(sysdig.com) -
Better security by design
(www.thoughtworks.com) -
Securing Webtasks Part 2: Using Middleware
(auth0.com) -
Malware Detection in Executables Using Neural Networks
(devblogs.nvidia.com) -
Thwarting the Tactics of the Equifax Attackers
(blog.cloudflare.com) -
Why Can’t I Just Send JWTs Without OAuth?
(nordicapis.com) -
Creating Secure Password Resets With JSON Web Tokens
(www.smashingmagazine.com) -
Privacy Pass - “The Math”
(blog.cloudflare.com) -
Safer SWIFT – Moving the security game to the level of programming languages
(www.novoda.com) -
Is Your Security Scaling Up Along with Your Operation?
(airbrake.io) -
Explain Like I’m 5: Zero Knowledge Proof (Halloween Edition)
(hackernoon.com) -
Many-faced threats to Serverless security
(hackernoon.com) -
OAuth 2.0 Best Practices for Native Apps
(auth0.com) -
Building Application Backends with End-to-end Encryption
(hackernoon.com) -
WPA2 KRACK Attack: The WiFi Hack and What it Means
(auth0.com) -
Dangerous Pickles — Malicious Python Serialization
(intoli.com) -
An Overview of the Security Ecosystem in Programming
(blog.codeship.com) -
SAST, DAST, and RASP: A guide to the new security alphabet soup
(blog.sqreen.io) -
App Security: Introducing Cross-Site Scripting
(fly.io) -
Protect your npm account with 2FA and Authy
(twilioinc.wpengine.com) -
Securing Webtasks Part 1: Shared Secret Authorization
(auth0.com) -
Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
(security.googleblog.com) -
Everything You Ever Wanted to Know About Secure HTML Forms
(twilioinc.wpengine.com) -
Securing Services for Kubernetes on AWS
(code.hootsuite.com) -
Protecting ICOs and cryptocurrency users
(umbrella.cisco.com) -
Geo Key Manager: How It Works
(blog.cloudflare.com) -
Meet Gatebot - a bot that allows us to sleep
(blog.cloudflare.com) -
How does it work? Docker! Part 3: Load balancing, service discovery and security!
(blog.octo.com) -
Poison Packages in Python
(blog.sqreen.io) -
Stepping Up the Cloud Security Game
(labs.spotify.com) -
Building Account Systems
(auth0.com) -
Understanding the prevalence of web traffic interception
(blog.cloudflare.com) -
JavaScript for Microcontrollers and IoT: SSL/TLS
(auth0.com) -
Declaratively securing REST APIs to specific clients
(engineering.monsanto.com) -
SIDH in Go for quantum-resistant TLS 1.3
(blog.cloudflare.com) -
A Simple, Secure Tool for One-time (Self-Destructing) Messages
(blog.algolia.com) -
Detecting and blocking bad bots
(blog.sqreen.io) -
Hardening the Kernel in Android Oreo
(android-developers.googleblog.com) -
The WireX Botnet: How Industry Collaboration Disrupted a DDoS Attack
(blog.cloudflare.com) -
Getting Started with the SRVB Cryptosystem
(www.toptal.com) -
7 Docker security vulnerabilities and threats
(sysdig.com) -
Learnings from the last Huddle: Cybersecurity
(engineering.zomato.com) -
Identity and Access Management (IAM) in the aftermath of NotPetya
(developer.ibm.com) -
Find projects infected by malicious npm packages
(twilioinc.wpengine.com) -
2016 Social, Passwordless and SSO Data: What Can We Learn?
(auth0.com) -
Open Sourcing Jaqen, A Tool For Developing DNS Rebinding PoCs
(engineering.linkedin.com) -
Starting the Avalanche
(medium.com) -
Protecting a Spring Boot App with Apache Shiro
(developer.okta.com) -
Securing W Magazine: Our Migration to HTTPS
(technology.condenast.com) -
High-reliability OCSP stapling and why it matters
(blog.cloudflare.com) -
Remote device sign-in
(developers.soundcloud.com) -
A container identity bootstrapping tool
(blog.cloudflare.com) -
Building a privacy-preserving architecture with less server trust
(www.thoughtworks.com) -
Hacking Blockchain
(capgemini.github.io) -
Stupidly Simple DDoS Protocol (SSDP) generates 100 Gbps DDoS
(blog.cloudflare.com)