From Security Weekly WikiJump to navigationJump to search
- Threat Modeling Manifesto encourages more practical modeling with principles to make the results meaningful.
- Greybox Automatic Exploit Generation for Heap Overflows in Language Interpreters encourages a hybrid of human and automation approaches to discover and attack flaws in our code.
- Announcing the Cloud Native Security White Paper encourages an understanding of security principles and how to apply them to each phase of the cloud application lifecycle.
- Meet the Microsoft Pluton processor – The security chip designed for the future of Windows PCs, which encourages more trusted boot and secure secret handling to better adhere to The Seven Properties of Highly Secure Devices.
- DevSecOps Implementation: Source Composition Analysis encourages a smart evaluation of how to control your software supply chain.
- Botnets have been silently mass-scanning the internet for unsecured ENV files encourages better storage of secrets outside of text files.
- Drupal sites vulnerable to double-extension attacks, encouraging us to remember that old vulns are destined for re-invention.