1Hackers Impersonate Brands to Steal YouTube Channels (opens in new tab)(utkusen.substack.com)1utku13373mo ago0
2Don't Do Live Demos, Do Live-Looking Demos (opens in new tab)(utkusen.substack.com)4utku13375mo ago1
4Thoughts on How AI Will Shape Cyber Security (opens in new tab)(utkusen.substack.com)8utku13379mo ago2
5Apple Intelligence denies rewriting a sentence that contain "protests in Turkey" (opens in new tab)(twitter.com)7utku133711mo ago0
6Promptmap: A prompt injection scanner for LLM applications (opens in new tab)(github.com)2utku13371y ago0
7BaitRoute: A web honeypot library to create vulnerable-looking endpoints (opens in new tab)(github.com)1utku13371y ago0
9Spotting AI Cheaters in Remote Tech Interviews (opens in new tab)(utkusen.medium.com)1utku13371y ago0
10Can Engineers Stage a Coup and Take over Their Company? (opens in new tab)(utkusen.medium.com)14utku13371y ago10
11Evaluating the Impact of a Security Breach Using the "So What?" Technique (opens in new tab)(utkusen.medium.com)1utku13371y ago0
13Spotify Should Implement a Donation Feature to Save Mid-Tier Musicians (opens in new tab)(utkusen.medium.com)5utku13371y ago5