
Artikel
Inside the 'clawdhub' Malicious Campaign: AI Agent Skills Drop Reverse Shells on OpenClaw Marketplace
Jetzt lesen
Artikel
Inside the 'clawdhub' Malicious Campaign: AI Agent Skills Drop Reverse Shells on OpenClaw Marketplace
Jetzt lesen


Artikel
From SKILL.md to Shell Access in Three Lines of Markdown: Threat Modeling Agent Skills
Jetzt lesenAnzeige 337 - 360 von 362 ressourcen
CTF platforms & practice
Capture the Flag (CTF) competitions are a popular way for cybersecurity enthusiasts, students, and professionals to test and expand their skills in a gamified environment. Over the years, several platforms have emerged that offer CTF challenges and practice environments.
CTF strategies & techniques
Capture the Flag (CTF) has become increasingly popular in the field of cybersecurity as a training ground for aspiring ethical hackers and cybersecurity professionals. It involves a series of challenges where participants must use their technical skills and knowledge to solve problems, find hidden flags, and gain points. CTF challenges cover a wide range of topics, including web application security, binary analysis, cryptography, and more.
CTF tools
CTFs (Capture the Flag) are competitions where participants try to solve various cybersecurity challenges, such as exploiting vulnerabilities, reverse engineering, digital forensics, and cryptography, to retrieve a "flag." To assist in solving these challenges, there are numerous CTF tools available, and participants typically have a toolkit that caters to the various CTF categories.
How to respond to a newly discovered vulnerability
Learn how to effectively respond to newly discovered vulnerabilities with a structured approach using the Vulnerability Management Cycle. Discover the importance of tools like Snyk for centralizing, analyzing, and remediating vulnerabilities across your software development lifecycle.
JavaScript Static Analysis with ESLint and Biome
Biome, a new tool in the JavaScript ecosystem, combines code formatting and quality linting. It offers speed and performance advantages over traditional tools like ESLint and Prettier, making it a compelling alternative. With its integration into development environments like VS Code and potential adoption by major projects, Biome is poised to reshape the way JavaScript developers approach code quality and formatting.
Oops I built a feature and created an Open Redirect Vulnerability in a Deno app
Build your first Deno web application with a step-by-step guide. Learn how to implement a redirect feature while avoiding common security pitfalls like open redirect vulnerabilities. Secure your Deno app with best practices and discover how to set up a Deno development environment in GitHub Codespaces.
How Snyk Helps with the OWASP Software Assurance Maturity Model
Read how the OWASP Software Assurance Maturity Model (SAMM) and Snyk can work together to provide an effective approach to measuring, managing, and improving your software security. Learn about the key benefits, practical implementation steps, and the specific tools offered by Snyk to support your organization's security journey.
Decoding CVEs: A practical guide to assessing and mitigating security risks
Let's explore the world of Common Vulnerabilities and Exposures (CVEs) with step-by-step examples of evaluating if a CVE impacts your project and pragmatic strategies for effective mitigation. This guide will empower you to tackle security vulnerabilities head-on. Don't let CVE warnings go unnoticed — learn how to address them confidently and efficiently.
Top 10 npm power-user commands every JavaScript developer should know
Master essential npm commands to streamline your JavaScript development. Whether it's dependency management or security enhancements, you can boost efficiency and protect your projects. Learn how to leverage npm ls, npm why, npm run, and more to elevate your npm skills today.
How Snyk uncovers libuv CVE-2024-24806 SSRF vulnerabilities in the Node.js project
Node.js is a powerful and widely used runtime that allows developers to build scalable and high-performance applications using JavaScript. However, many developers might not realize that Node.js relies heavily on several third-party open-source components to function effectively. Key among these components are libuv, OpenSSL, and V8