Breaking CityHash64, MurmurHash2/3, wyhash and more…
Hash functions are incredibly beautiful mathematical objects. They can map arbitrary data to a small range of fixed-size output data in such a way that the mapping is…
Hash functions are incredibly beautiful mathematical objects. They can map arbitrary data to a small range of fixed-size output data in such a way that the mapping is…
Recently, the head of the advanced technologies department of Positive Technologies, Nikolai Anisenya, visited the AUTHORITY channel.
The tekkix news service visited the SOC Forum 2024. This is another event dedicated to cybersecurity, organized by the Solar Group of companies. Due to a busy work schedule,…
The anonymous Hidden Lake network is a unique and rather peculiar project in its field, as it is based on completely different methods and approaches to traffic anonymization…
Hello, tekkix! My name is Suleiman, and I am a Senior Software Engineer with over 10 years of programming experience. I develop complex web services that can scale and…
In September, UnShelledSec posted an interesting post on X, the goal of which was to find the exact location based on just one picture, a task that is not easy, but Ron…
Hello, tekkix! We continue to share interviews with our colleagues, whose stories especially captivate us - and we hope they will seem interesting to you too. In honor…
Hello, readers! Anastasia Berezovskaya, an application development security engineer at Swordfish Security, is with you. Today we will once again talk about the features…
Linux as a server OS is considered a guarantee of reliability and security, it is popular with companies and ordinary users. However, no system is completely impervious…
You apply the key card to the reader, and the office door opens. But what if such a pass can be hacked and copied by anyone?
In the life of every HR, sooner or later, HE appears... Security professional! And how to approach hunting people for this position is usually unclear.
I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl…
Continuing the story about vulnerabilities discovered by UCSB pentesters and formed the basis of cases at the Pentest Award, we publish an analysis of the following real…
Hello, tekkix! The security team of the Platform, led by its team leader Vladimir Bukin, is in touch. The main task of our team is to protect CI/CD and, in particular,…
The profession of a fraudster is highly competitive: to stay afloat and be economically efficient, poor fellows must keep up with trends and respond quickly to changes.…
Recently, developers using the Trivy image scanner encountered the TOOMANYREQUESTS error. It occurred due to the maximum number of tool users and the download rate limit…
In the article, we will talk about the PAM class solution, as well as consider who privileged users are and what key role they play in managing access to critical systems…