· Alex · security
What We Know About The XZ Utils Backdoor Supply Chain Attack
The well planed attack that almost compromised the SSH servers around the world
The well planed attack that almost compromised the SSH servers around the world
Learn a bit about Linux, its filesystem, basic and advanced commands every hacker should know
How it works, real world applications, pros and cons
What is vulnerability scanning, examples and remediation strategies
Types, guidelines, and API authentication methods.
Guidelines, security measures and steps to securing file uploads