Second wave of Shai-Hulud npm worm compromises the global software supply chain
The dangers of incorrect CSP implementations
Pros and Cons of DNS Over HTTPS
Netsparker's Web Security Scan Statistics for 2018
The Dangers of Open Git Folders
NoScript Vulnerability in Tor Browser
Analyzing Impact of WWW Subdomain on Cookie Security
Sven Morgenroth Talks About PHP Type Juggling on Paul's Security Weekly Podcast
Vulnerability Assessments and Penetration Tests – What's the Difference?