Kerberoasting: A Gateway to Privilege Escalation in Enterprise Networks Post date October 11, 2024 Post author By Ahmed Olabisi Olajide Post categories In authentication, cybersecurity, enterprise-security, kerberoasting, kerberoasting-attacks, kerberos, privilege-escalation, security-vulnerabilities
The Ultimate Unseen Vulnerability in Addressing Cybersecurity Threats: Communication Post date September 17, 2024 Post author By blackheart Post categories In categorize-security-risks, critical-vulnerabilities, cyber-security-awareness, cybersecurity-skills, patch-management, patching, security-vulnerabilities, vulnerability-management
The Ultimate Unseen Vulnerability in Addressing Cybersecurity Threats: Communication Post date September 17, 2024 Post author By blackheart Post categories In categorize-security-risks, critical-vulnerabilities, cyber-security-awareness, cybersecurity-skills, patch-management, patching, security-vulnerabilities, vulnerability-management
How Remote Access Trojans Bypass Traditional Security Measures Post date September 10, 2024 Post author By Micheal Chukwube Post categories In cyberattack-strategies, cybersecurity-threats, digital-threats, network-security, remote-access-trojans, security-vulnerabilities, traditional-security-measures, trojans-and-malware
Dazed and Confused: What’s Wrong with Crypto Libraries? — Abstract and Introduction Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Dazed and Confused: What’s Wrong with Crypto Libraries? — Threats to Validity Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Dazed and Confused: What’s Wrong with Crypto Libraries? — Results and Discussion Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Dazed and Confused: What’s Wrong with Crypto Libraries? — Acknowledgments and References Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Dazed and Confused: What’s Wrong with Crypto Libraries? — Conclusions Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Dazed and Confused: What’s Wrong with Crypto Libraries? — Methodology Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Dazed and Confused: What’s Wrong with Crypto Libraries? — Related Work Post date June 15, 2024 Post author By CryptoColumns Post categories In api-misuse, crypto-libraries, crypto-library-usability, cryptographic-apis, cryptography, encryption-issues, security-vulnerabilities, stack-overflow-analysis
Critical Vulnerability in VM2 Sandbox Found Affecting Spotify Portal Platform Backstage Post date November 28, 2022 Post author By Sergio De Simone Post categories In cloud-security, devops, JavaScript, News, open source, security-vulnerabilities, templating
How GitHub Uses Machine Learning to Extend Vulnerability Code Scanning Post date February 21, 2022 Post author By Sergio De Simone Post categories In AI, ML & Data Engineering, Code Analysis, development, devops, github, JavaScript, machine-learning, neural-networks, News, security-vulnerabilities, typescript
8 Steps to Secure JavaScript in 2021 Post date May 13, 2021 Post author By Viduni Wickramarachchi Post categories In front-end-development, JavaScript, secure-apps, security-vulnerabilities, web-development