Leveraging Custom GitLeaks TOML with Secret Magpie to Maximise Secret Detection
Relying on the built in rules for secret scanning tools only gets you so far. Here’s how to tailor your secret detection to maximise value!
Relying on the built in rules for secret scanning tools only gets you so far. Here’s how to tailor your secret detection to maximise value!
As we celebrate another year of Punk Security, we went back to the drawing board to develop some awesome new DevSecOps-themed CTF challenges.
We take a look at the Zed Attack Proxy as it moves away from OWASP and towards the Software Security Project
We put a lot of effort into testing our CTF platform, but a simple oversight nearly meant we had to call it off.
We use Cloudflare to protect our CTF from spam bots, VPNs and hackers.
We brought DevSecOps to UK Cyber Week with some tricky little challenges