Young hacker smiling

Topics

Our blog articles seek to cover different topics related to security and/or topics of interest in the world of IT, they can also reflect the author’s opinion about a specific issue related to security. If you want to collaborate and you do not have a topic clear, in this section we give you ideas and once they are covered by an article we update the #TrendingTopics list. Among the topics of interest are:

Attacks

  • Poodle TLS.

  • Simple cracking of non-reversible keys.

  • Cracking with rainbow tables.

  • Web shells without collateral effects.

  • Reflected file download

Recommendations

  • API throttling.

  • Recommended hashing function.

  • Recommended asymmetric encryption function.

  • Recommended symmetric encryption function.

  • How to stop effectively a ddos without proxies.

  • IAST.

  • DAST.

  • SAST.

  • SecDevOps.

  • Why we use monorepo?

  • Why we use trunk based development?

  • Why we use continuous delivery?

  • Why we use infrastructure as code?

  • Why we use staticgen?

  • Why we use SLB?

  • Why we use asciidoc?

  • Refactoring JS with linting.

Concepts

  • Immutable infrastructure.

  • Red team.

  • Blue team.

  • Purple team.

  • Capture the flag.

  • NixOS

  • Linters as normalizers.

  • Poor man linter: check-all/changed and pcregrep.

Standards

  • Misra Standard.

  • Bearer authentication.

  • SOAP basic authentication.

  • SOAP digest authentication.

  • Correctness by Construction (CbyC).

  • Security development lifecycle (SDL).

  • Comprehensive software development model.

  • Lightweight application security process (CLASP).

  • Team software process for secure SW/Dev (TSP-Secure).

  • Conceptual security modeling (CoSMo).

  • UMLSec.

Summary

  • Bitcoin blockchain security issues.

  • Ethereum security issues.

  • Stellar security issues.

  • Machine learning for vulnerabilities searching.

  • Incidents associated with vulnerabilities.


Service status - Terms of Use