- Hypernetes: Bringing Security and Multi-tenancy to Kubernetes
- Docker Compose Environment Variable Binding Examples – Java, Node.Js, PHP, Python, & Ruby On Rails
- Introducing Blue Ocean: a new user experience for Jenkins
- When seconds really do matter
- LVE: an alternative container technology to Docker and Virtuozzo/LXC
- Containers: Just Because Everyone Else is Doing Them Wrong, Doesn’t Mean You Have To
- Fun with DNS
- Putting the Dev in Devops: Bringing Software Engineering to Operations Infrastructure Tooling
- Immutable Infrastructure with AWS and Ansible – Part 1 – Setup
- Dual Deployment: A Low-Risk Way to Run Containers in Production
- Service Discovery for NGINX Plus with ZooKeeper
- Stack Overflow: How We Do Deployment – 2016 Edition
- Django, ELB health checks and continuous delivery
- Let’s build a PicoCluster for Docker Swarm
- Continuous QA: Bridging Continuous Integration and Continuous Delivery
- linkerd: Twitter-style Operability for Microservices
- Create a Slack Docker proxy in Go – Part 2
- Let’s define “container-native”
- Self-Healing Systems
- Docker as a Personal Application Runner
- JGroups-based clustering and node discovery with Google Cloud Storage
- Docker for Mac and Windows Beta: the simplest way to use Docker on your laptop
- Docker Image Building Strategy and Other Misconceptions About Image Size Reduction
- Dokku – An easy way to deploy web apps
- The Netflix IMF Workflow
- Service Discovery with Docker and Consul: part 1
- Testing Degraded Network Scenarios with rkt
- How to choose the right DevOps tools
- How to deploy secure, auditable, and reproducible Kubernetes clusters on AWS
- Satellite: Monitoring Kubernetes in Production
- Heroku Behind the Curtain: Patching the glibc Security Hole
- Introducing Experimental Distributed Application Bundles
- DevOpsDays: Empathy, Scaling, Docker, Dependencies and Secrets
- Blue-Green Deployment
- DevOps gold nuggets: scaling down gracefully with AWS Lambda and HAProxy
- Continuous Deployment at Instagram
- Automate All the Things With Ansible: Part Two
- Docker Flow: Proxy – On-Demand HAProxy Service Discovery and Reconfiguration
- Continuous Deployment With Helm, Deis Workflow, and Wercker
- Do You Test Your IT Operations and Business Processes?
- Centralized Logging and Monitoring
- Simulating Auto Scaling Build Clusters Part 3: When Auto Scaling Build Fleets Work
- Docker Meets Continuous Deployment
- How Docker Makes Testing More Efficient
- Netflix OSS, Spring Cloud, or Kubernetes? How About All of Them!
- Contaminate AWS instances on ssh login
- Manhattan software deployments: how we deploy Twitter’s large scale distributed database
- Kubernetes Cluster on Azure and Expose Couchbase Service
- Deploy and configure a local Docker caching proxy
- Under the hood: Teletraan deploy system
- Taming the herd: using Zookeeper and Exhibitor on Google Container Engine
- Speedy Deployments And The Meaning Of Devops
- Hey developer! DevOps doesn’t mean what you think it does
- The Power of Test-Driven Network Automation
- Network Monitoring, Moral Hazards and Crumple Zones
- Kafka Inside Keystone Pipeline
- Running ELK stack on docker – full solution
- Dockerizing Spring Boot Applications
- Building highly available applications using Kubernetes new multi-zone clusters
- Weave + Docker for Mac: The bridge between local and remote services
- Explaining the Popularity of Hyper-Converged Infrastructure
- Jenkins 2 Pipeline 101
- Choosing a Microservices Deployment Strategy Part 6
- How the Fear of Automation Holds Your Team Back
- Inside the Magic Pocket
- How Docker Makes Testing More Efficient
- How to install OpenShift as your private PaaS
- Docker meets Continuous Deployment
- Super fast local workloads with LXD, ZFS, and Juju
- Improving Docker with Unikernels: Introducing HyperKit, VPNKit and DataKit
- Couchbase on Kubernetes
- Containers all the way through
- Facebook Chef cookbooks
- A Docker Container Pattern – Compose Configuration
- I want to be a Devops!
- Docker Flow: Blue-Green Deployment and Relative Scaling
- Docker and zombies
- AWS is inappropriate for small startups because its complexity demands a specialist
- Journey to continuous integration
- Unprivileged Build Containers
- The Dokku Trap
- CLDB Monitoring Using JMX as a Modern Alternative to Ganglia
- docker – Kubernetes development cluster up in one command
- What is DevOps? Breaking Down this Cultural Shift
- Wrangling Grafana and InfluxDB into a Docker image
- Get Started with rkt Containers in Three Minutes
- Container Tidbits: When Should I Break My Application into Multiple Containers?
- Docker – Quick Java 8 or Java 7 Dev Environment with Dockers
- CI/CD with Docker Cloud
- How We Build Code at Netflix
- Running Spring Boot in a Docker Container
- Network namespaces
- The Joy of Deploying Apache Storm on Docker Swarm
- Monitoring Cassandra at Scale
- Seesaw: scalable and robust load balancing
- Global Cloud – Active-Active and Beyond
- 9 Common Dockerfile Mistakes
- Create self-managing servers with Masterless Saltstack Minions
- Distributed Data Analysis with Docker Swarm
- Bitbucket Pipelines Beta: continuous delivery inside Bitbucket
- Remote Copying of Generated Keys
- Docker Networking and DNS: The Good, The Bad, And The Ugly
- Automate All the Things With Ansible: Part One
- Meson: Workflow Orchestration for Netflix Recommendations
- Conflating The Roles of Alerting and Dashboards
- Looking at DiagnosticCommandMBean in JConsole and VisualVM
- Consul Service Discovery Part 1
- Dynomite-manager: Managing Dynomite Clusters
- Observability at Twitter: technical overview, part II
- Docker container using Apache Mesos and Marathon
- Nginx: a caching, thumbnailing, reverse proxying image server?
- Scaling neural network image classification using Kubernetes with TensorFlow Serving
- Scalable and resilient Django with Kubernetes
- 10 Questions to Ask When Evaluating a Software Asset
- Monitoring Greedy Containers (Part 1)
- Ensuring Containers Are Always Running with Docker’s Restart Policy
- Stop deploying packages
- Overview of the Twitter Cloud Platform: Compute
- Microcontainers – Tiny, Portable Docker Containers
- WTF is operations? #serverless
- CI as Code Part II: Stateless Jenkins With Dynamic Docker Slaves
- Debugging why ping was Broken in Docker Images
- Couchbase Cluster on Docker Swarm using Docker Compose and Docker Machine
- Packing the way to immutable infrastructure
- Monitoring Docker Containers – docker stats, cAdvisor, Universal Control Plane
- Idempotent version updates with Ansible
- Docker Tutorial for Beginners
- Habitat – a new open source project for automating applications
- CoreOS Overview, Part One
- Dockerise your PHP application with Nginx and PHP7-FPM
- Monitoring microservices with Synthetic Transactions in Go: Part 2
- Count me as a systemd convert
Last active
July 1, 2021 09:22
-
-
Save peanutpi/022356b33a0afe47548b1fa3cc6c1dd6 to your computer and use it in GitHub Desktop.
- Google Cloud Dataproc managed Spark and Hadoop service now GA
- From SQL to Microservices: Integrating AWS Lambda with Relational Databases
- Microsoft answers AWS Lambda’s event-triggered serverless apps with Azure Functions
- Your User Pools for Amazon Cognito
- Node.js on Google App Engine goes beta
- How to build an image host using AWS Lambda, S3, and Dynamo
- What it looks like to process 3.5 million books in Google’s cloud
- Want to know why your application is slow? Cloud Trace’s new features can help.
- Resources for Migrating Parse Applications to AWS
- Announcing the first Technical Preview of Microsoft Azure Stack
- Everybody gets WebSockets
- Introducing On-Demand Pipeline Execution in AWS Data Pipeline
- AWS Device Farm Update – Remote Access to Devices for Interactive Testing
- 3 Reasons AWS Lambda Is Not Ready for Prime Time
- Announcing HyperDev – The Developer Playground for Building Full-stack Web Apps, Fast
- Deploying 15 MB Node.js VMs effortlessly to AWS
- Google and Red Hat announce cloud-based scalable file servers
- Custom Machine Types goes GA, saving you up to 50% on compute costs
- GoDaddy Announces Worldwide Launch of Cloud Servers & Cloud Applications
- How Kubernetes takes container workload portability to the next level
- AWS Lambda for Beginners
- Google Compute Engine boosts high availability controls
- How we found a bug in Amazon ELB
- Google Cloud Datastore simplifies pricing, cuts cost dramatically for most use-cases
- AWS Database Migration Service
- IBM cloud launches Swift runtime, open-source AWS Lambda competitor, GitHub Enterprise, VMware support
- Introducing Google Stackdriver: unified monitoring and logging for GCP and AWS
- Stackdriver Trace for App Engine is GA; app latency has nowhere to hide
- AWS Lambda with API Gateway
- Now playing: New ISO security and privacy certifications for Google Cloud Platform
- Using Amazon Auto Scaling with stateful applications
- Introducing Google Container Engine (GKE) node pools
- 10 Lessons from 10 Years of Amazon Web Services
- Google Cloud Launcher simplifies running third party apps in the cloud
- Anomaly Detection Using PySpark, Hive, and Hue on Amazon EMR
- Analyze a Time Series in Real Time with AWS Lambda, Amazon Kinesis and Amazon DynamoDB Streams
- Managed Platform Updates for AWS Elastic Beanstalk
- Automatic replacement of Autoscaling nodes with equivalent spot instances
- How to get your ASP.NET app up on Google Cloud the easy way
- Saving hundreds of hours with Google Compute Engine Per-Minute Billing
- Amazon RDS Update – Share Encrypted Snapshots, Encrypt Existing Instances
- Platforms as Business Models of the Future: Theory and Practical Application
- Now Generally Available: Amazon Inspector
- Ruby on Google App Engine goes beta
- Introducing the Google API Console
- Elastic infrastructure in practice
- Web Dev. Reading List #124: Responsibility, Flexbox Order, And More
- Double Shot #1666
- Dew Drop – May 3, 2016 (#2242)
- Dew Drop – February 8, 2016 (#2183)
- Programming Digest #146 for February 15, 2016
- Data Science Roundup #28: AlphaGo, Building Data Science Teams, and Why Calculus is So Last Century
- This Week in Spring – 23 Feb 2016
- Web Development Reading List #140: CSS-Only Dropdowns, Toggles And HTML Sliders
- Programming Digest #150 for March 14, 2016
- Double Shot #1673
- Dew Drop – March 30, 2016 (#2219)
- Java Annotated Monthly – March 2016
- The Daily Six Pack: January 29, 2016
- Programming Digest #149 for March 7, 2016
- The Flexbox Reading List: Techniques and Tools
- Some links on Java garbage collection
- Dew Drop – March 15, 2016 (#2208)
- Web Development Reading List #128: Firefox 45, A Multi-Colored Font And Better Force-Pushing
- Dew Drop – January 26, 2016 (#2174)
- Web Development Reading List #134: AI, Keyboard Interactions And Living Style Guides
- Programming Digest #155 for April 18, 2016
- Dew Drop – February 3, 2016 (#2180)
- Double Shot #1648
- Double Shot #1662
- Dew Drop – June 13, 2016 (#2270)
- Programming Digest #153 for April 4, 2016
- Double Shot #1635
- Dew Drop – April 28, 2016 (#2240)
- Double Shot #1689
- Dew Drop – February 18, 2016 (#2191)
- Double Shot #1674
- Dew Drop – February 15, 2016 (#2188)
- Double Shot #1643
- The Daily Six Pack: January 25, 2016 | Dirk Strauss
- Web Development Reading List #131: Git 2.8, CSS Grids And The Key To Good Code
- Dew Drop – May 6, 2016 (#2246)
- Double Shot #1682
- Dew Drop – April 26, 2016 (#2238)
- Programming Digest #159 for May 16, 2016
- Dew Drop – March 25, 2016 (#2216)
- Dew Drop – April 1, 2016 (#2221)
- This Week in Spring – March 18th, 2016
- Dew Drop – May 10, 2016 (#2248)
- Web Development Reading List #138: Accessible Web Components And CSS And Sass Precision
- Data Science Roundup #21 – Gravity Waves, Undersea Data Centers, and the Facebook Social Graph
- Data Science Roundup #27: The Future of Data Tools! Plus the Misadventures of Tay…
- Double Shot #1675
- Dew Drop – May 31, 2016 (#2262)
- Double Shot #1669
- Programming Digest #147 for February 22, 2016
- Dew Drop – June 10, 2016 (#2269)
- Double Shot #1636
- Double Shot #1685
- Data Science Roundup #20: Autonomous Hedge Funds, Education in the Age of AI, and NYC Bike Share
- Double Shot #1692
- Dew Drop – February 26, 2016 (#2197)
- Dew Drop – January 28, 2016 (#2176)
- Dew Drop – April 13, 2016 (#2229)
- Web Development Reading List #141: jQuery 3, Chillout.js, And How Technology Shapes Society
- Web Development Reading List #123: Meaningful Git Commits and HTTP Status Codes
- Programming Digest #157 for May 2, 2016
- Double Shot #1665
- Quick links
- Dew Drop – February 29, 2016 (#2198)
- Double Shot #1655
- Dew Drop – May 25, 2016 (#2259)
- Dew Drop – February 22, 2016 (#2193)
- Dew Drop – March 10, 2016 (#2205)
- Microservices Weekly: Issue #15
- Dew Drop – February 5, 2016 (#2182)
- Dew Drop – May 20, 2016 (#2256)
- Double Shot #1693
- Dew Drop – February 17, 2016 (#2190)
- Double Shot #1677
- Dew Drop – May 11, 2016 (#2249)
- Programming Digest #156 for April 25, 2016
- Double Shot #1642
- Weekend Reading List: Free eBooks and Other Online Resources
- Programming Digest #148 for February 29, 2016
- Double Shot #1672
- Dew Drop – June 14, 2016 (#2271)
- Programming Digest #161 for May 30, 2016
- Dew Drop – February 24, 2016 (#2195)
- Dew Drop – April 4, 2016 (#2222)
- Web Development Reading List #132: The Challenges In Our Field, Debouncing And More
- Web Development Reading List #133: Workflow Tools And The Aesthetics Of Invisible Code
- April 2016
- Double Shot #1698
- Dew Drop – March 17, 2016 (#2210)
- Double Shot #1686
- Dew Drop – May 17, 2016 (#2253)
- Dew Drop – May 9, 2016 (#2247)
- Web Development Reading List #135: Boxy SVG, How To Keep Up, CSS Frameworks
- Dew Drop – March 3, 2016 (#2201)
- Programming Digest #163 for June 13, 2016
- Dew Drop – April 21, 2016 (#2235)
- Double Shot #1670
- Double Shot #1632
- Dew Drop – May 2, 2016 (#2242)
- Web Development Reading List #125: The Fallacy Of Urgency And Building A Modern Theme Switcher
- Double Shot #1687
- Data Science Roundup #19: Saying Goodbye to Marvin Minsky, Scientific Reproducibility, and more
- Dew Drop – February 2, 2016 (#2179)
- Dew Drop – April 18, 2016 (#2232)
- Dew Drop – April 22, 2016 (#2236)
- Dew Drop – May 19, 2016 (#2255)
- Double Shot #1691
- Dew Drop – February 16, 2016 (#2189)
- Web Development Reading List #139: jQuery 3, Web Payment API, And ES6 Tricks
- Dew Drop – June 8, 2016 (#2267)
- Dew Drop – February 4, 2016 (#2181)
- Double Shot #1697
- Programming Digest #154 for April 11, 2016
- Double Shot #1696
- Double Shot #1690
- Double Shot #1679
- Web Development Reading List #130: Opera Mini, Workflow Fragility And Happy Work
- Programming Digest #151 for March 21, 2016
- Programming Digest #145 for February 8, 2016
- Double Shot #1640
- Dew Drop – January 29, 2016 (#2177)
- Dew Drop – March 7, 2016 (#2202)
- Double Shot #1644
- Dew Drop – January 25, 2016 (#2173)
- Dew Drop – April 7, 2016 (#2225)
- Dew Drop – April 27, 2016 (#2239)
- The Daily Six Pack: January 27, 2016
- Double Shot #1684
- Dew Drop – May 4, 2016 (#2243)
- Dew Drop – June 6, 2016 (#2266)
- Programming Digest #160 for May 23, 2016
- Data Science Roundup #18: Microsoft Making Moves, Kaggle Releases Open Data Platform, and more
- Web Development Reading List #136: Design Usability, Meaningful CSS And Project Include
- Dew Drop – May 27, 2016 (#2261)
- Double Shot #1676
- Double Shot #1647
- Dew Drop – March 24, 2016 (#2215)
- Dew Drop – May 18, 2016 (#2254)
- Data Science Roundup #26: Is your data team functional? Retention analysis, water data, and more!
- Programming Digest #144 for February 1, 2016
- Dew Drop – February 11, 2016 (#2186)
- Dew Drop – April 5, 2016 (#2223)
- Programming Digest #143 for January 25, 2016
- Web Development Reading List #126: Clever Interfaces, Open AMP Alternative & Art Of Slow Growth
- Programming Digest #158 for May 9, 2016
- Data Science Roundup #24: Data science @ Airbnb and data anonymization in Python
- Dew Drop – March 16, 2016 (#2209)
- Dew Drop – March 22, 2016 (#2213)
- Data Science Roundup #25: When data science goes (very) wrong, fighting poverty with data, and more
- Double Shot #1701
- Double Shot #1658
- Dew Drop – March 23, 2016 (#2214)
- Dew Drop – May 23, 2016 (#2257)
- Dew Drop – February 1, 2016 (#2178)
- Double Shot #1671
- Double Shot #1653
- Dew Drop – March 21, 2016 (#2212)
- 100 Active Blogs on Analytics, Big Data, Data Mining, Data Science, Machine Learning
- Dew Drop – April 15, 2016 (#2231)
- Double Shot #1683
- Dew Drop – May 16, 2016 (#2252)
- Dew Drop – April 20, 2016 (#2234)
- Dew Drop – April 25, 2016 (#2237)
- Dew Drop – March 18, 2016 (#2211)
- Double Shot #1650
- Double Shot #1652
- Double Shot #1641
- Dew Drop – May 26, 2016 (#2260)
- Top 10 Data Science Resources on Github
- 10 Awesome Python Tutorials to Kick-Start your Projects
- Dew Drop – February 12, 2016 (#2187)
- Double Shot #1659
- A Distributed Systems Seminar Reading List
- Data Science Roundup #22: Four Case Studies in Business Analytics (and Apache Arrow!)
- Dew Drop – April 8, 2016 (#2226)
- Dew Drop – February 10, 2016 (#2185)
- Dew Drop – March 9, 2016 (#2204)
- Double Shot #1637
- Data Science Roundup #29: Introducing Analyst Collective! Plus, the (Premature?) Death of BI
- Dew Drop – March 14, 2016 (#2207)
- Web Development Reading List #122: A Performance Budget Builder, Streams, And The Web Push API
- Double Shot #1661
- Programming Digest #162 for June 6, 2016
- Dew Drop – February 23, 2016 (#2194)
- Dew Drop – April 29, 2016 (#2241)
- Double Shot #1649
- Data Science Roundup #23: The Man Behind AlphaGo, Building Global Recommendation Algos, and more
- Double Shot #1631
- Double Shot #1638
- The Daily Six Pack: January 26, 2016
- Dew Drop – April 12, 2016 (#2228)
- Dew Drop – April 14, 2016 (#2230)
- The Daily Six Pack: February 1, 2016
- Dew Drop – February 25, 2016 (#2196)
- Web Development Reading List #137: The New Let’s Encrypt Client And SSH Shortcuts
- Dew Drop – May 12, 2016 (#2250)
- Web Development Reading List #129: CSRF, Modern Tooling And The UX Of Web Fonts
- Dew Drop – June 2, 2016 (#2264)
- Dew Drop – March 29, 2016 (#2218)
- Dew Drop – March 11, 2016 (#2206)
- Double Shot #1663
- Double Shot #1654
- Double Shot #1656
- Dew Drop – May 24, 2016 (#2258)
- Dew Drop – June 9, 2016 (#2268)
- Double Shot #1688
- Double Shot #1668
- Dew Drop – May 5, 2015 (#2244)
- Dew Drop – May 13, 2016 (#2251)
- Dew Drop – February 19, 2016 (#2192)
- Double Shot #1646
- Dew Drop – June 15, 2016 (#2272)
- Dew Drop – April 6, 2016 (#2224)
- Double Shot #1664
- Double Shot #1694
- Dew Drop – February 9, 2016 (#2184)
- Double Shot #1695
- Dew Drop – June 1, 2016 (#2263)
- Dew Drop – March 1, 2016 (#2199)
- Dew Drop – March 31, 2016 (#2220)
- Double Shot #1634
- Double Shot #1680
- Dew Drop – March 28, 2016 (#2217)
- Double Shot #1678
- Dew Drop – March 8, 2016 (#2203)
- Double Shot #1645
- Double Shot #1639
- Programming Digest #152 for March 28, 2016
- Dew Drop – April 19, 2016 (#2233)
- Double Shot #1700
- Double Shot #1681
- Dew Drop – April 11, 2016 (#2227)
- Dew Drop – June 3, 2016 (#2265)
- Double Shot #1667
- Double Shot #1657
- Double Shot #1660
- Hacker swipes 27m passwords from popular dating site proving we’ve learned nothing
- Introducing TAuth: Why OAuth 2.0 is bad for banking APIS and how we’re fixing it
- Validating JWT With Spring Boot and Spring Security
- Multiple vulnerabilities found in Quanta LTE routers (backdoor, backdoor accts, RCE, weak WPS)
- Rewrite Everything In Rust
- SWIFT says second bank hit by malware attack
- 3 Months and 1 Million SSH Attempts Later
- How to Engineer Secure Things: Past Mistakes and Future Advice
- Cookies vs. Tokens: The Definitive Guide
- Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs
- Possible Jenkins Project Infrastructure Compromise
- Xen exploitation part 1: XSA-105, from nobody to root
- Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds
- Web Storage: the lesser evil for session tokens
- On the Right Fix, and Why the Bugzilla Breach Made Me Proud
- Exploring SSTI in Flask/Jinja2
- Stored, Reflected and DOM XSS in Google for Work Connect (GWC)
- DNS Zombies
- Goodbye CSRF – SameSite to the rescue!
- Here’s 5 Ways You Can Improve Security With Agile Development
- 400Gbps: Winter of Whopping Weekend DDoS Attacks
- API Security Lessons From Fisher-Price’s Smart Toy Bear Security Flaw
- When a nation is hacked: Understanding the ginormous Philippines data breach
- An XSS on Facebook via PNGs & Wonky Content Types
- Data Is a Toxic Asset
- Distribution packages considered insecure
- Crooks Go Deep With ‘Deep Insert’ Skimmers
- Running and disguising programs through XCode shims on OS X
- Hacker News CSRF Vulnerability
- Linux kernel bug delivers corrupt TCP/IP data to Mesos, Kubernetes, Docker containers
- Encryption is not Binary
- Skimmers Hijack ATM Network Cables
- Widespread JBoss Backdoors a Major Threat
- Stop using JWT for sessions
- A Deep Dive Into DNS Packet Sizes: Why Smaller Packet Sizes Keep The Internet Safe
- The common thread: Fuzzing, Bug Triage, and Attacker Automation
- Domain Validation Vulnerability in Symantec Certificate Authority
- The Shortest Reflected XSS Attack Possible
- Race you to the kernel!
- DROWN attack is the new Heartbleed: patch now
- IRS: 390K More Victims of IRS.Gov Weakness
- Padding oracles and the decline of CBC-mode cipher suites
- A Tale of Security Gone Wrong
- The Basics of Web Application Security
- Uber exposed its drivers’ social security and tax info, its third data flub in less than a year
- A tale of a DNS exploit: CVE-2015-7547
- An Introduction to DOM XSS
- Bypassing Antivirus With Ten Lines of Code or (Yet Again) Why Antivirus is Largely Useless
- Practical Reverse Engineering Part 2 – Scouting the Firmware
- ImageMagick Is On Fire – CVE-2016-3714
- Building a safer web, for everyone
- The misunderstood X-XSS-Protection
- Giant Food Sees Giant Card Fraud Spike
- Help Make Open Source Secure
- Security isn’t a feature, it’s a part of everything
- Advanced Tor Browser Fingerprinting
- Out-of-Box Exploitation: A Security Analysis of OEM Updaters
- A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
- Exploiting Buffer
- Taint Tracking for Chromium
- Linux expert Matthew Garrett: Ubuntu 16.04’s new Snap format is a security risk
- How your data is collected and commoditised via “free” online services
- Malwarebytes Anti-Malware Vulnerability Disclosure
- Serialization Must Die: Act 2: XStream (Jenkins CVE-2016-0792)
- More Encryption, More Notifications, More Email Security
- Seamless Phishing
- Securing the web, together
- JWT Authentication With AngularJS – Video and Tutorial
- No More Deceptive Download Buttons
- No More Deceptive Download Buttons
- Mossack Fonseca Breach – WordPress Revolution Slider Plugin Possible Cause
- Improving the Security and User Experience of your Google Sign In Implementation
- Introducing Sign in with Slack
- From encrypt to decrypt – the full Lorenz story
- It takes two to ChaCha (Poly)
- How the Pwnedlist Got Pwned
- Simultaneous Discovery of Vulnerabilities
- A Gentle Introduction to Secure Computation
- CVE-2016-3115 Multiple CRLF injection vulnerabilities in session.c in OpenSSH before 7.2p2
- MitM-ing Postgres
- Adobe Patches Flash Player Zero-Day Threat
- WordPress 4.5.2 Security Release
- Android privilege escalation to mediaserver from zero permissions (CVE-2014-7920 + CVE-2014-7921)
- Lessons learned while protecting Gmail
- Slack bot token leakage exposing business critical information
- Avoiding XSS Detection
- eBay Exposed to Severe Vulnerability
- Preventing CSRF with the same-site cookie attribute
- Banks: Credit Card Breach at CiCi’s Pizza
- Remote Code Execution in all git versions (client + server) < 2.7.1: CVE-2016-2324, CVE-2016-2315
- Measuring SMTP STARTTLS Deployment Quality
- Evolving the Safe Browsing API
- Rails security digest and review reminders #7
- The 10 Most Important Security Controls Missing in JavaEE
- Capability Myths Demolished
- ELF Shared Library Injection Forensics
- Reversing and Exploiting Embedded Devices: The Software Stack (Part 1)
- 45m passwords stolen from over 1,100 VerticalScope forums
- Security Incident (June 12 2016)
- Shifting Tactics: Tracking changes in years-long espionage campaign against Tibetans
- Advance Disclosure Needed to Keep Users Secure
- What are SSL ciphers & session keys?
- Noodles & Company Probes Breach Claims
- URL shorteners aren’t always as safe as they look
- StartSSL Domain validation (Vulnerability discovered).
- Helping webmasters re-secure their sites
- If You Can’t Break Crypto, Break the Client: Recovery of Plaintext iMessage Data
- Multiple 7-Zip Vulnerabilities Discovered by Talos
- Seagate Phish Exposes All Employee W-2’s
- Thieves Nab IRS PINs to Hijack Tax Refunds
- Panama Papers: Email Hackable via WordPress, Docs Hackable via Drupal
- How 18F handles information security and third party applications
- Slicing Into a Point-of-Sale Botnet
- The Technology Behind Apple Photos and the Future of Deep Learning and Privacy
- Calculate the cost and probability of a DDoS attack
- Identity and Access Management: Where Security and Operations Meet
- Protecting the world’s news from digital attack
- My First 10 Minutes On a Server – Primer for Securing Ubuntu
- Skimmers Found at Walmart: A Closer Look
- Popular WordPress Plugin Comes with a Backdoor, Steals Site Admin Credentials
- Secure websites shun HTTP Public Key Pinning
- A Dramatic Rise in ATM Skimming Attacks
- Mutual Problems
- To bypass code-signing checks, malware gang steals lots of certificates
- 2016 Guide to User Data Security (Part 1)
- The Path Toward Increasing the Security of DNSSEC with Elliptic Curve Cryptography
- Bypassing Rolling Code Systems
- Hackers Claim to Have a Stunning 427 Million Myspace Passwords
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment