Leveraging Custom GitLeaks TOML with Secret Magpie to Maximise Secret Detection
Relying on the built in rules for secret scanning tools only gets you so far. Here’s how to tailor your secret detection to maximise value!
Relying on the built in rules for secret scanning tools only gets you so far. Here’s how to tailor your secret detection to maximise value!
Our funky PCB Art badges made it back to BSIDES Cheltenham!
DevSecOps tooling can be bypassed and ignored if proper development processes are not enforced, and this is where peer approvals come in
As we celebrate another year of Punk Security, we went back to the drawing board to develop some awesome new DevSecOps-themed CTF challenges.
AWS Athena is the easiest way to search organisation-wide cloudtrails implemented by AWS Control Tower. In this blog, we walk you through it.
We’re diving deep into a lesser-discussed variant of HTML injection that isn’t very well known at all, Base Tag Injection.