PuTTy Ciritcal Vulnerability: private key compromise - CVE-2024-31497

If you've used a 521-bit ECDSA key (ecdsa-sha2-nistp521) with any previous version of PuTTY, consider it compromised! Generate a new key pair, and remove the old public key from authorized_keys files.

telegram pyzw bug

Telegram Desktop Zero-Day: ACE Python

Let us finally clarify the vulnerability of the desktop version of Telegram, which caused a stir on Z-Day.

The Xz-Istential Linux Backdoor CVE 2024 3094

The XZ Utils backdoor is a sophisticated supply chain attack that targeted the open-source data compression utility widely used in Linux and Unix-like systems.

Flask

Securing Your Flask Application

This post explores essential techniques like encrypting HTTP communication, preventing injection attacks etc .. For flask as well as web applications in general.

VPN

A VPN for privacy ... ๐Ÿค”! Really ?

Many people have the false idea, that VPNs provide a layer of privacy and anonymity against Cyberthreats ๐Ÿคท. In this post I'll explain why that's simply not true, provide cases when you might need one, and how to actually be private.