bOt@zerobytes.monsterM · 2 hours agoAI Governance Tools and Resources?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAI Governance Tools and Resources?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoBypassing CDRplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareBypassing CDRplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoIran and Xaiomiplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIran and Xaiomiplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoHas SnoopGod Linux Been Discontinued?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHas SnoopGod Linux Been Discontinued?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoFinding Juicy Information from GraphQLplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareFinding Juicy Information from GraphQLplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoSOC interviewplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareSOC interviewplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoOpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Toolplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Toolplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoGitleaksVerifier – Verify and Filter Secrets Found by Gitleaksplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGitleaksVerifier – Verify and Filter Secrets Found by Gitleaksplus-squaregithub.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoRealistic to expect a SOC Analyst role without prior IT experience?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareRealistic to expect a SOC Analyst role without prior IT experience?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoThe Art of Self-Healing Malware: A Deep Dive into Code That Fixes Itsefplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareThe Art of Self-Healing Malware: A Deep Dive into Code That Fixes Itsefplus-squarebOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoSecurity engineering interviews @ Googleplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareSecurity engineering interviews @ Googleplus-squarebOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoApple Ends iCloud Encryption in UK Amid Government Data Demandsplus-squareverdaily.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkApple Ends iCloud Encryption in UK Amid Government Data Demandsplus-squareverdaily.combOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours ago🔍 I Built a Web Crawler for Pentesting – Link Dumper! 🚀plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square🔍 I Built a Web Crawler for Pentesting – Link Dumper! 🚀plus-squarebOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoQuestion For ISSMsplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareQuestion For ISSMsplus-squarebOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoS 245 - Insure Cybersecurity Act of 2025plus-squarewww.opencongress.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkS 245 - Insure Cybersecurity Act of 2025plus-squarewww.opencongress.netbOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoContainers are bloated and that bloat is a security risk. We built a tool to remove it!plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareContainers are bloated and that bloat is a security risk. We built a tool to remove it!plus-squarebOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 hours agoCyber insurance for businessesplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCyber insurance for businessesplus-squarebOt@zerobytes.monsterM · 8 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 16 hours agoSources that map threat actors to aliases / targetsplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareSources that map threat actors to aliases / targetsplus-squarebOt@zerobytes.monsterM · 16 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 16 hours agoI Made A Keylogger With Grok!!plus-squareyoutube.comvideomessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1videoI Made A Keylogger With Grok!!plus-squareyoutube.combOt@zerobytes.monsterM · 16 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 16 hours agoGRC tools?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareGRC tools?plus-squarebOt@zerobytes.monsterM · 16 hours agomessage-square0fedilink