Wiring a Home Network Last year, my partner and I moved into a new (to us) house. One of the first things I needed to get done was to get our home network setup as we both were (still are) working from home due to COVID-19. This post will explore some of that process, some of the decisions I made along the way, what I learned, and some details on the end setup. Networking Wiring IT Home A PHP Compiler, aka The FFI Rabbit Hole It’s no secret that I’m into building toy compilers and programming languages. Today I’m introducing something that’s not a toy (I hope). Today, I’m introducing php-compiler (among many other projects). My hope is that these projects will grow from experimental status into fully production ready systems. PHP HHVM Open Source Compiler libjit libgccjit llvm Optimization Performance Recki-CT Protecting Against XSS In RAILS - JavaScript Contexts Recently my team was working to implement Brakeman in our CI processes to automatically scan our codebase for security vulnerabilities. Among a few other issues, it identified a handful of similar XSS vulnerabilities of a similar pattern: <script type="text/javascript"> var FOO = "<%= raw whatever %>"; ReactDOM.render(<Blah foo={window.FOO} />, document.getElementById('some_place')); </script> This is a pretty straight forward vulnerability, since passing untrusted data to a JavaScript context can lead to XSS.
FEATURES
ALTERNATIVES
Cybersecurity Ventures is a leading research and market intelligence firm providing insights, news, and analysis on the cybersecurity industry.
A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.
F-Secure Blog provides in-depth articles and research on cybersecurity threats and best practices.
Securelist by Kaspersky Lab provides in-depth cybersecurity research and solutions across multiple industries.
Stay updated on Gh0st Networks lab activities, CTF challenges, and join the slack team for support.
A leading cybersecurity podcast network offering in-depth discussions on current security trends and insights.
Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.
A comprehensive guide on obtaining domain admin in a Windows estate through various techniques and defenses.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.