If you've used a 521-bit ECDSA key (ecdsa-sha2-nistp521) with any previous version of PuTTY, consider it compromised! Generate a new key pair, and remove the old public key from authorized_keys files.
Telegram Desktop Zero-Day: ACE Python
Let us finally clarify the vulnerability of the desktop version of Telegram, which caused a stir on Z-Day.
The Xz-Istential Linux Backdoor CVE 2024 3094
The XZ Utils backdoor is a sophisticated supply chain attack that targeted the open-source data compression utility widely used in Linux and Unix-like systems.
Securing Your Flask Application
This post explores essential techniques like encrypting HTTP communication, preventing injection attacks etc .. For flask as well as web applications in general.
A VPN for privacy ... đ¤! Really ?
Many people have the false idea, that VPNs provide a layer of privacy and anonymity against Cyberthreats đ¤ˇ. In this post I'll explain why that's simply not true, provide cases when you might need one, and how to actually be private.