Tag: Infosec
-
Wget to wipeout: Malicious Go modules fetch destructive payload
Posted on June 30, 2025, Level beginner Resource Length medium
Sockets threat research team uncovered a destructive supply-chain attack targeting Go developers. In April 2025, three malicious Go modules were identified, using obfuscated code to fetch and execute remote payloads that wipe disks clean. The Go ecosystem's decentralized nature, lacking central gatekeeping, makes it vulnerable to namespace confusion and typosquatting, allowing attackers to disguise malicious modules as legitimate ones. By @socket.dev.
Tags programming golang app-development infosec servers
-
Background of Coinbase's May 2025 breach
Posted on May 31, 2025, Level beginner Resource Length long
Coinbase, America's largest cryptocurrency exchange, received an unsolicited email from an unknown threat actor on May 11, 2025. They claimed to possess sensitive information about its customers and demanded a ransom of $20 million. By Dilip Kumar Patairya.
Tags infosec blockchain fintech crypto cio
-
Bitcoin Core to unilaterally remove controversial OP-Return limit
Posted on May 27, 2025, Level beginner Resource Length medium
In 2014, crypto advertising barely existed. The term "Web3" hadn't been coined, Facebook banned crypto ads and startups promoting their tokens were mostly confined to forums and niche publications. But for Bitmedia founder Matvii Diadkov, the opportunity was obvious. By Martin Young.
Tags app-development blockchain fintech crypto infosec
-
Python adopts standard lock file format for reproducible installs
Posted on May 13, 2025, Level beginner Resource Length short
Python's ecosystems now have a standardized lock file format called pyproject.lock (or pylock.toml) defined by PEP 751. This was formally adopted after the proposal was accepted. By Sarah Gooding.
Tags python cloud infosec devops
-
How AI coding tools open the door to hackers through fake packages
Posted on April 20, 2025, Level beginner Resource Length medium
A new UTSA study exposes how AI coding assistants can hallucinate fake software packages—creating an easy gateway for hackers to hijack your code with a single, trusted command. By University of Texas at San Antonio.
Tags infosec app-development open-source learning
-
How to build an API: A complete guide to creating secure and scalable APIs
Posted on March 24, 2025, Level beginner Resource Length long
APIs (Application Programming Interfaces) are the backbone of modern software applications, enabling seamless communication between different systems. Whether you're building a web app, or mobile service, or managing complex data, learning how to build an API is essential for creating scalable, efficient systems. APIs can be categorized into several types based on their architecture, such as REST, GraphQL, and SOAP, each with specific use cases. By @geeksforgeeks.org.
Tags apis web-development app-development infosec json
-
AWS 2025: New features and changes you should know
Posted on January 23, 2025, Level beginner Resource Length medium
AWS is one of the most popular cloud platforms, and it's important to stay updated on what's new. In this blog, we will look at the most important updates to AWS in 2025. These updates include new tools, improved features, and services that will make cloud computing easier, faster, and more cost-effective. By Croma Campus.
Tags app-development distributed aws infosec learning
-
The security risks and benefits of AI/LLM in software development
Posted on December 11, 2024, Level beginner Resource Length long
In a world where 67% of organizations are either using or planning to use AI, the software development landscape is undergoing a seismic shift. Artificial Intelligence, Machine Learning, and Large Language Models (AI/ML/LLMs) aren't just buzzwords anymore—they are reshaping how we build, secure, and innovate. By securityjourney.com.
Tags data-science ai software infosec programming
-
8 essential Android 15 security features you should set up immediately
Posted on October 1, 2024, Level beginner Resource Length medium
Google has released Android 15, which includes several significant security enhancements. These updates focus on privacy and theft protection, such as Private space, which allows users to create a separate, secure area on their device for sensitive data and apps1. Additionally, theft protection features include automatic device locking if theft is detected and preventing factory resets without authentication. By Parth Shah.
Tags android learning app-development infosec google
-
Serverless use cases: How enterprises are using the technology to let developers innovate
Posted on September 7, 2024, Level beginner Resource Length medium
Serverless, or serverless computing, is an approach to software development that empowers developers to build and run application code without having to worry about maintenance tasks like installing software updates, security, monitoring and more. With the rise of cloud computing, serverless has become a popular tool for organizations looking to give developers more time to write and deploy code. By Mesh Flinders.
Tags infosec microservices ibm serverless
-
What is AI security?
Posted on August 19, 2024, Level beginner Resource Length medium
Short for artificial intelligence (AI) security, AI security is the process of using AI to enhance an organization's security posture. With AI systems, organizations can automate threat detection, prevention and remediation to better combat cyberattacks and data breaches. By Annie Badman, Matthew Kosinski.
Tags infosec ai ibm cloud software-architecture cio
-
Identity threat detection and response solution guide
Posted on August 15, 2024, Level intermediate Resource Length medium
Identity Threat Detection and Response (ITDR) has emerged as a critical component to effectively detect and respond to identity-based attacks. Threat actors have shown their ability to compromise the identity infrastructure and move laterally into IaaS, Saas, PaaS and CI/CD environments. Identity Threat Detection and Response solutions help organizations better detect suspicious or malicious activity in their environment. By The Hacker News.
Tags infosec devops cloud software-architecture learning cio