Browsing Tag
cybersecurity
128 posts
CVE-2026-0798: Gitea’s Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers
Gitea’s Ghost in the Machine: Leaking Private Release Notes via Zombie Watchers Vulnerability ID: CVE-2026-0798 CVSS Score: 3.5…
CVE-2025-13465: Lodash: The Delete Button for the Universe (CVE-2025-13465)
Lodash: The Delete Button for the Universe (CVE-2025-13465) Vulnerability ID: CVE-2025-13465 CVSS Score: 6.9 Published: 2026-01-21 A prototype…
Making Linux Work as a Corporate Desktop
🔒 Corporate Linux Desktop Security: The Immutable Advantage Quick take: Traditional Linux desktops are mutable—attackers can modify system…
SafeLine: The Open-Source WAF That Holds the Line Until Your Code is Ready
In the fast-paced world of web development, security is often an afterthought until a vulnerability alert lands in…
How to Store Critical Secrets for 100+ Years
The “Root of Trust” Problem Every sophisticated security system eventually collapses into a single point of failure: one…
What Really Happens When You Join Public Wi-Fi (And How To Stay Safe Anyway)
You are at an airport, your flight is delayed, and the free Wi-Fi pops up. You tap Connect,…
I Built NimPacket, a Raw Packet Crafting Library in Nim, and It Turned Into One of My Best Cyber Projects
For my cybersecurity masters work, I wanted to go deeper than running tools and reading packet captures. I…
Google’s Antigravity Hacked in 24 Hours: Why AI Agents Need a New Security Architecture
Last week, Google’s new Gemini-based coding tool Antigravity went live. It took security researchers less than 24 hours…
The Future of Cyber Resilience for Complex AWS Environments is Here
2025 has seen the cloud landscape continue to evolve at an extraordinary pace. As organizations accelerate their AI,…
Non-functional Application Requirements: Compliance
Compliance isn’t just a checkbox. It’s the difference between a thriving business and a company facing €1.2 billion…