Second wave of Shai-Hulud npm worm compromises the global software supply chain
The End of CoinHive and the Rise of Cryptojacking
Introducing the Security of Cookies Whitepaper
Sound Hijacking – Abusing Missing XFO
Brave Browser Sacrifices Security
Phishing by Open Graph Protocol
Remote Hardware Takeover via Vulnerable Admin Software
Cross Site Cookie Manipulation
CVSS: Characterizing and Scoring Vulnerabilities