Wiring a Home Network Last year, my partner and I moved into a new (to us) house. One of the first things I needed to get done was to get our home network setup as we both were (still are) working from home due to COVID-19. This post will explore some of that process, some of the decisions I made along the way, what I learned, and some details on the end setup. Networking Wiring IT Home A PHP Compiler, aka The FFI Rabbit Hole It’s no secret that I’m into building toy compilers and programming languages. Today I’m introducing something that’s not a toy (I hope). Today, I’m introducing php-compiler (among many other projects). My hope is that these projects will grow from experimental status into fully production ready systems. PHP HHVM Open Source Compiler libjit libgccjit llvm Optimization Performance Recki-CT Protecting Against XSS In RAILS - JavaScript Contexts Recently my team was working to implement Brakeman in our CI processes to automatically scan our codebase for security vulnerabilities. Among a few other issues, it identified a handful of similar XSS vulnerabilities of a similar pattern: <script type="text/javascript"> var FOO = "<%= raw whatever %>"; ReactDOM.render(<Blah foo={window.FOO} />, document.getElementById('some_place')); </script> This is a pretty straight forward vulnerability, since passing untrusted data to a JavaScript context can lead to XSS.
FEATURES
ALTERNATIVES
Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.
Schneier on Security provides expert analysis and commentary on a wide range of security issues.
A leading online publication providing news, analysis, and insights on cybersecurity, IT leadership, and technology trends.
Weekly summary of cybersecurity news and exploits.
A cybersecurity news platform providing updates on threats, vulnerabilities, and breaches.
A cybersecurity blog from Microsoft, featuring articles and guides on various security topics, including AI, threat intelligence, cloud security, and incident response.
A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.