| | Defeating JavaScript Obfuscation (perimeterx.com) |
|
18 points by EMM_386 on July 22, 2022 | past
|
| | Importing Your Cloud Resources into Pulumi (perimeterx.com) |
|
1 point by amirshk80 on April 6, 2021 | past
|
| | The Missing LNKR (perimeterx.com) |
|
2 points by ccmpx on Oct 22, 2020 | past
|
| | CSP Bypass Vulnerability in Google Chrome Discovered (perimeterx.com) |
|
3 points by RobertSmith on Aug 12, 2020 | past
|
| | Zero Day CSP Bypass Vulnerability in Google Chrome Discovered (perimeterx.com) |
|
2 points by ccmpx on Aug 10, 2020 | past
|
| | Exfiltrating User’s Private Data Using Google Analytics to Bypass CSP (perimeterx.com) |
|
7 points by amirshk80 on June 18, 2020 | past
|
| | Exfiltrating User’s Private Data Using Google Analytics to Bypass CSP (perimeterx.com) |
|
2 points by ccmpx on June 17, 2020 | past
|
| | Deobfuscating a Magecart Skimming Toolkit (perimeterx.com) |
|
1 point by ccmpx on April 23, 2020 | past
|
| | New Stealth Magecart Attack Bypasses Payment Services Using Iframes (perimeterx.com) |
|
1 point by ccmpx on April 14, 2020 | past
|
| | Skimming-as-a-Service: Anatomy of a Magecart Attack Toolkit (perimeterx.com) |
|
19 points by ccmpx on March 31, 2020 | past | 2 comments
|
| | RPC Olympics – The Search for the Perfect RPC Protocol (perimeterx.com) |
|
88 points by amirshk80 on March 18, 2020 | past | 70 comments
|
| | I found a WhatsApp security flaw that allowed hackers to read the file system (perimeterx.com) |
|
555 points by ccmpx on Feb 4, 2020 | past | 129 comments
|
| | OK Let’s Go: Three Approaches to Structuring Go Code (perimeterx.com) |
|
2 points by ohjeez on June 12, 2019 | past
|
| | Client-Side – The Security Blindspot of Your Website (perimeterx.com) |
|
4 points by JakeTheAndroid on April 24, 2019 | past
|
| | Scaling out with Prometheus (perimeterx.com) |
|
1 point by mroi on April 9, 2018 | past
|
| | Zero-downtime deployment with Docker and HAProxy (perimeterx.com) |
|
21 points by mroi on Dec 5, 2016 | past
|
| | Hijacking a User's Shadow: Affiliate Fraud via Malicious Extensions (July 2016) (perimeterx.com) |
|
1 point by joelhumphrey on Nov 20, 2016 | past
|
| | When Kafka met Bruce: How one service can boost app messaging reliability (perimeterx.com) |
|
3 points by mroi on Nov 4, 2016 | past
|
| | “There and Back Again” – The Story of a Stream (processing) (perimeterx.com) |
|
6 points by mroi on Oct 20, 2016 | past | 1 comment
|
| | Hijacking a User’s Shadow: Affiliate Fraud via Malicious Extensions (perimeterx.com) |
|
11 points by mroi on July 7, 2016 | past
|
| | Reverse Engineering Sneaker Bots – Stealing Your New Shoes (perimeterx.com) |
|
14 points by mroi on May 4, 2016 | past | 1 comment
|
| | Blocking Tor: A Case for Better Detection (perimeterx.com) |
|
9 points by mroi on April 6, 2016 | past
|
| | Bugzilla CVE-2015-4499: All Your Bugs Are Belong to Us (perimeterx.com) |
|
123 points by Chris911 on Sept 18, 2015 | past | 35 comments
|
| | Bugzilla CVE-2015-4499: All Your Bugs Are Belong to Us (perimeterx.com) |
|
3 points by conductor on Sept 17, 2015 | past
|
| | Critical security vulnerability in Bugzilla (perimeterx.com) |
|
7 points by mroi on Sept 17, 2015 | past
|