1,278 Results for:url

  • Sort by: 

Cisco Talos techniques uncover ransomware sites on dark web

By Alexander Culafi 28 Jun 2022

One of the three techniques Cisco Talos used to de-anonymize ransomware dark web sites is to match TLS certificate serial numbers from dark web leak sites to the clear web. Read More

NCSC warns public of potential Queen-related phishing attacks

By Alex Scroxton 14 Sep 2022

The National Cyber Security Centre is urging users to be on guard against phishing attacks during the period of national mourning for the Queen Read More

Security Think Tank: A brief history of (secure) coding

By Michael Healey 31 May 2023

From controlling who was allowed to work with IBM mainframes to present-day DevSecOps techniques, the concept of secure coding has a longer history than you might think Read More

Learn to work with the Microsoft Graph Security API

By Liam Cleary 12 Oct 2021

The API assists organizations that want to connect their security systems with a programmatic way to produce quicker results when performing investigations. Read More

Microsoft fixes SSRF vulnerabilities found in Azure services

By Arielle Waldman 17 Jan 2023

Orca Security, which discovered the Azure flaws, warned enterprises to be aware of SSRF attacks, which can result in a threat actor accessing or modifying sensitive data. Read More

How to SSH into GitHub on Windows example

By Cameron McKenzie 11 Jan 2022

Here's a quick tutorial to connect to GitHub with SSH on Windows. It's easy, and you'll establish a GitHub SSH Windows connection with Git in no time. Read More

How to fork a Git repository

By Cameron McKenzie 20 Jul 2021

Looking for the fork command in Git? Well, it doesn’t exist. Here we'll show you how to fork a Git or GitHub repo on your own. Read More

Top 10 Chrome extensions for web developers

By Darcy DeClute 21 Apr 2023

Installation of the right browser plugins can make a programmer significantly more productive. Here are 10 productivity boosting-Chrome extensions for web developers to install. Read More

16 REST API design best practices and guidelines

By Matt Heusser 09 Feb 2021

Common guidelines for API design lead to better functionality and flexibility. Follow these REST API design best practices to help you tend to your burgeoning API garden. Read More

How to convert a PEM file to PPK format example

By Cameron McKenzie 08 Feb 2022

Need to SSH into a remote server with PuTTY but your PEM file just won do the trick? Here's a quick example of how to convert a PEM file to PPK format with PuTTYGen so your SSH sessions with PuTTY ... Read More