Security
Mapping the Attack Surface from the Inside
An Introduction to Reverse Engineering for eBPF Bytecode
On Reviewing Employee Accesses Managed Through Okta
Mercari’s passkey adoption
Bucket full of secrets – Terraform exfiltration
The Art of the Security Double Play: How Mercari Combines Internal Audits and Custom CodeQL Queries to Keep Systems Safe
Follow the White Rabbit: Finding The Women With The Red Dress In A Torrent of Event Logs
Supply-Chain Security: Evaluation of Threats and Mitigations
Fraud, How do we handle it ?
Restructuring the Kubernetes Threat Matrix and Evaluating Attack Detection by Falco