Is Pepper Useful for Hashing Secrets?
How is pepper useful, since it’s stored in plain text? It requires potential attacker to either get more information or work more. Learn more in this video.
Is Pepper Useful for Hashing Secrets? Read More »
How is pepper useful, since it’s stored in plain text? It requires potential attacker to either get more information or work more. Learn more in this video.
Is Pepper Useful for Hashing Secrets? Read More »
A programmer recently asked me how he could switch to a cybersecurity role. The answer might surprise you.
5 Effective Ways To Switch Roles Read More »
Applications using LLMs open to a huge number of vulnerabilities and potential attacks. Learn why and what to do to enhance the security of your products. Links:
LLMs are Highly Insecure Read More »
In which Alex explains the meaning of this phrase: “The threat actor used OSINT reconnaissance to map our attack surface, exploited a vulnerability to gain initial access, then used lateral movement and privilege escalation before exfiltrating PII and establishing persistence”
Security Jargon for Developers Read More »