178
1
Building Multi-Agent Systems (Part 3) (sshh.io)
55
Okta's NextJS-0auth troubles (joshua.hu)
1
Visibility at scale: How Figma detects sensitive data exposure (figma.com)
1
If Managers Were Angels (bonnycode.com)
1
Dismantling a Critical Supply Chain Risk in VSCode Extension Marketplaces (wiz.io)
3
Eleven Missing Terraform Features (josnyder.com)
10
Supply Chain Attacks on Linux Distributions (fenrisk.com)
3
GitHub Action supply chain attack: reviewdog/action-setup (wiz.io)
2
History: What Happened with Ciscogate (cybersect.substack.com)
1
My LLM Codegen Workflow (harper.blog)
1
Thirty Things (timiajiboye.com)
6
Codename Goose (block.github.io)
149
Hacking Subaru: Tracking and controlling cars via the admin panel (samcurry.net)
2
Big Bets (jackdanger.com)
3
Story of a Pentester Recruitment (silentsignal.eu)
1
Systematizing Systematization of Knowledge (oaklandsok.github.io)
1
SoK: On the Offensive Potential of AI (sok-offensive-ai.github.io)
1
A User's Guide to Building a Subculture (asteriskmag.com)
21
The death of Glitch, the birth of Slack (buildingslack.com)
1
(Re)-Introducing La Cryptographie Militaire (militarycryptography.xyz)
3
Security ProbLLMs in XAI's Grok (embracethered.com)
1
Encryption using data-specific keys (cash.app)
1
Death Generator: Create Game over/You Died Screens (deathgenerator.com)
4
Ninja Threat Modeling (2009) (archive.org)
2
The Secret School for the Best Founders (generalist.com)
2
To Build a Meritocracy (max.levch.in)
1
Source and Binary has ceased operations (rcrowley.org)
33
Client-side filtering of private data is a bad idea (mjg59.dreamwidth.org)
6
Google Pixel Phones Have Unpatched Flaw in Hidden Android App (wired.com)
23
Revealing the Inner Structure of AWS Session Tokens (medium.com/talbeerysec)
1
Using Infostealer Logs to Unmask CSAM Consumers (recordedfuture.com)
0
Our Approach to Building Security Tooling (latacora.com)
2
Summary of the [June] AWS Lambda Service Event in US-East-1 (amazon.com)
0
Designer Vulnerabilities (shellsharks.com)
2
Dell Inc.: A Masterclass in Capital Management (every.to/p)
1
Secret Ingredients, Trade Secrets, and the “Onion in the Varnish” (scopeofwork.net)
8
Jessica Hische Brings New Life to an Old Logo (printmag.com)
1
Benedict Evans's Presentations (ben-evans.com)
2
When, not if: The playbook method for managing risk (leaddev.com)
1
Coinbase Account Take over Statistics (coinbase.com)
1
‘Office Space’ inspired WA software engineer’s theft scheme, prosecutors say (seattletimes.com)
1
Why It’s So Hard to Become a Staff Engineer (jkebertz.medium.com)
4
2022 Jealousy List (bloomberg.com)
1
Amazon Pre-Sale for AMZ (amazontokens.io)
146
Why do new cars look like wet putty? (blackbirdspyplane.com)
1
My CI/CD pipeline is my release captain (amazon.com)
1
Upward Mobility (pudding.cool)
2
Performance “Seasons” Are Useless – Use Anniversary Reviews Instead (jacobian.org)
14
NPR Is Not Your Friend (currentaffairs.org)
1
How to hire and build your cybersecurity team
1
A Twitter plan to counter extremism fell apart
1
Building Layoffs on a Healthy Foundation
1
More Than a Semblance of Self
8
Twitter’s child porn problem ruined its plans for an OnlyFans competitor
1
Information Management
1
Technical Evaluation of a Startup
1
An Engineering Manager's Bill of Rights (and Responsibilities)
1