Hot in Security:
Latest Security Threads
AI is changing how offensive security workflows are designed, executed, and analyzed. AI Agents for Offensive Security: AI-powered attack...
New
Episode 300 of Thinking Elixir. It’s Episode 300 — a milestone just under 6 years in the making! To celebrate, we kick things off with a ...
New
Is security spending more tokens than your attacker?
New
Episode 299 of Thinking Elixir. The Erlang Ecosystem Foundation is seeking community support for a major grant to fund the Ægis security ...
New
Why the moat is the system, not the model
New
How to gain access to the contents of privacy-protected folders even though Privacy & Security settings say that access is denied.
New
Episode 298 of Thinking Elixir. News includes the hex.pm website getting a fresh new redesign, the Hex 2.4 package manager upgrading to O...
New
Trivy was attacked for twice recently.
CheckMarx and Telnyx was attacked too.
Looks like the attack is not slowing down.
New
Composio content pages powered by our CMS, including tutorials, product updates, and guides.
New
Moltbot Security Guide: close open ports, harden SSH, protect webhooks, secure databases, manage secrets, and monitor logs to prevent hac...
New
HOT IN Security THIS WEEK!
HOT IN Security THIS MONTH!
AI is changing how offensive security workflows are designed, executed, and analyzed. AI Agents for Offensive Security: AI-powered attack...
New
Episode 299 of Thinking Elixir. The Erlang Ecosystem Foundation is seeking community support for a major grant to fund the Ægis security ...
New
Episode 298 of Thinking Elixir. News includes the hex.pm website getting a fresh new redesign, the Hex 2.4 package manager upgrading to O...
New
Why the moat is the system, not the model
New
How to gain access to the contents of privacy-protected folders even though Privacy & Security settings say that access is denied.
New
Episode 300 of Thinking Elixir. It’s Episode 300 — a milestone just under 6 years in the making! To celebrate, we kick things off with a ...
New
Is security spending more tokens than your attacker?
New
HOT IN Security THIS YEAR!
A new Django blog post/announcement has been posted!
New
A new PostgreSQL blog post/announcement has been posted!
Get the full details here: PostgreSQL: PostgreSQL JDBC 42.7.7 Security update ...
New
A new Django blog post/announcement has been posted!
Get the full details here: Django security releases issued: 5.2.8, 5.1.14, and 4.2...
New
This document describes the security content of iOS 15.8.5 and iPadOS 15.8.5.
New
Two additional vulnerabilities have been identified in React Server Components. Users should upgrade to patched versions immediately.
New
A new Django blog post/announcement has been posted!
New
Episode 283 of Thinking Elixir. News includes celebrating Erlang’s 27th birthday as open source, results from the Elixir Hub 2025 survey ...
New
A new Django blog post/announcement has been posted!
Get the full details here: Django security releases issued: 5.2.9, 5.1.15, and 4.2...
New
One package.
One update.
A worm crawling through the BEAM ecosystem.
A dark “what if” — and how we can stop it before it’s real.
New
A new Go blog post/announcement has been posted!
Get the full details here: Go Cryptography Security Audit - The Go Programming Language
New
A new Django blog post/announcement has been posted!
Get the full details here: Django security releases issued: 5.2.2, 5.1.10, and 4.2...
New
People tend to put a lot of trust into their phones. Those devices have access to no end of se […]
New
A failure of security systems at PayPal is currently causing concern for numerous German banks and private customers. A vast number of pa...
New
If you’ve wrestled with static permissions, stale access rights, or overly rigid authorization models, this book is designed to help you ...
New
Episode 258 of Thinking Elixir. News includes the first CVE released under EEF’s new CNA program for an Erlang zip traversal vulnerabilit...
New
HOT IN Security THE LAST THREE YEARS!
Episode 173 of Thinking Elixir. We delve into the tricky world of cybersecurity with our guest, Michael Lubas. We touch on the widely-dis...
New
The Backbone of Cybersecurity: Hardware Security Modules | join.tech Blog.
Discover how Hardware Security Modules (HSMs) provide robust ...
New
A new Ruby blog post/announcement has been posted!
Get the full details here: https://www.ruby-lang.org/en/news/2025/02/26/security-adv...
New
A new Rust blog post/announcement has been posted!
Get the full details here: Security advisory for Cargo (CVE-2023-38497) | Rust Blog
New
Ars chats with law philosopher Scott Shapiro about his new book, Fancy Bear Goes Phishing.
New
New
Hello.
I am totally green, if we talk about hardware.
Could anybody recommend to me, how I could get into this knowledge?
My main goal...
New
Blog - Advancing iMessage security: iMessage Contact Key Verification - Apple Security Research.
iMessage broke new ground in 2011 as th...
New
A new Django blog post/announcement has been posted!
New
Episode 245 of Thinking Elixir. News includes a new library called phoenix_sync for real-time sync in Postgres-backed Phoenix application...
New
A new Rust blog post/announcement has been posted!
Get the full details here: Security advisory for the standard library (CVE-2024-2457...
New
Open source maintainers underpaid and going gray.
AI-coded contributions? Most would rather skip the bot’s work
New
Episode 250 of Thinking Elixir. News includes EEF board elections with voting beginning May 9th, Gleam v1.10.0 enhancing security with SB...
New
Apple loses copyright battle against security start-up Corellium.
Apple lost its copyright lawsuit against Corellium, a small security r...
New
Episode 251 of Thinking Elixir. News includes a critical Unauthenticated Remote Code Execution vulnerability in Erlang/OTP SSH, José Vali...
New
HOT IN Security THIS Over 3 Years!
Cyber-criminals have your web applications in their crosshairs. They exploit common security mistakes in your web application to steal us...
New
This past weekend saw the latest competition take place and the newest iPhone, the iPhone 13 Pro running the latest and fully patched ver...
New
Raspberry Pi security alarm — the basics.
In November last year — I started building a DIY security alarm system, using a Raspberry Pi a...
New
Computer security is a complex issue. But you don’t have to be an expert in all the esoteric details to prevent many common attacks. Atta...
New
2020 has seen a significant uptick in the number of companies looking at adding Digital Wallets and tokenization to their offerings. On o...
New
Things like smart speakers (such Amazon Alexa), smart TVs or other devices with built in microphones, cameras or with other features that...
New
Cybersecurity leaders discuss business resiliency and identity challenges during a session at VMworld 2020.
https://www.techrepublic.co...
New
Following this news: https://forum.devtalk.com/t/silver-sparrow-new-malware-found-on-30k-macs-has-security-pros-stumped/7241 just wondere...
New
Just discovered this:
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on...
New
I had a bit of a mini-adventure following Sobelow’s advice on adding a CSP to a Phoenix App. If you want to follow along, or want to add ...
New
We engineered a wearable microphone jammer that is capable of disabling microphones in its user’s surroundings, including hidden micropho...
New
A new PostgreSQL blog post/announcement has been posted!
Get the full details here: PostgreSQL: PostgreSQL JDBC 42.3.2/42.2.25 Security...
New
As part of our continued goal of helping developers provide safer products for businesses and consumers, we here at McAfee Advanced Threa...
New
TLDR
Hacking 30 Mobile Apps and their APIs with consent of some of the major providers in the area.
100% success rate in hacking the AP...
New
For those that are interested, Snyk (developer security tool) announced support for Elixir earlier this week:
Just thought I’d pass it...
New
Security
Classification:
Topic
Forum Category:
General
Threads:
258
Posts:
288
"Our portal about all things security related."
- Follow
- Join
- Shape
the conversation
Latest Security Jobs
Featured Security Book
Latest Security Learning Resources
AI Agents for Offensive Security (Manning)
AI Learning ResourcesDynamic Authorization: Adaptive access control (Manning)
Backend Learning ResourcesSanitizing HTML with HtmlSanitizeEx - ElixirCasts
Backend Learning ResourcesMaking Sense of Cybersecurity (Manning)
Backend Learning ResourcesCyber Security Career Guide (Manning)
Backend Learning ResourcesSecure Your Node.js Web Application (PragProg)
General Learning ResourcesPractical Security (PragProg)
General Learning ResourcesSecurity Events (WIP)
Get money off!
The Pragmatic Bookshelf
35% off any eBook
Manning Publications
45% off any item
The Pragmatic Studio
20% off any course
Linux New Media
15% off any non-sub item
Simply use coupon code "devtalk.com" at checkout. Where applicable this coupon can be used for an many items and as many times as you like!
Filter by Type:
My Saved Portals
-
None saved yet










