2YARA beyond files: extending rules to network IoCs (opens in new tab)(blog.virustotal.com)2bradleyjkemp2y ago0
3Detecting phishing sites with high-entropy strings (opens in new tab)(phish.report)3bradleyjkemp2y ago0
4Detecting phishing sites with high-entropy strings (opens in new tab)(phish.report)1bradleyjkemp2y ago0
6Show HN: IOK – an open ruleset and DSL for detecting phishing kits (opens in new tab)(phish.report)2bradleyjkemp3y ago0
7Humans who can RPC: securing staff access to 2000 microservices (opens in new tab)(monzo.com)2bradleyjkemp3y ago0
8Humans who can RPC: securing staff access to 2000 microservices (opens in new tab)(monzo.com)6bradleyjkemp3y ago0
9Show HN: Prevent your computer sleeping with just a webpage (opens in new tab)(nosleep.page)252bradleyjkemp3y ago130