Blog
In the rapidly evolving world of software development, containerization has become a cornerstone of modern infrastructure. Container registries, the repositories where container images are stored and distributed, play a critical role in this ecosystem. However, a persistent and alarming issue threatens the security of countless applications and systems worldwide: unprotected container registries.
As an offensive security enthusiast I am playing around and testing all kinds of different GenAI / LLM stack and models on an almost daily basis. Local stacks like genai-stack are interesting projects, especially if you care about your data protection.
Just recently I watched this DEFCON talk by Aapo Oksman:
asm
In todays digital world, businesses are constantly exposed to security threats. With the rapid adoption of cloud services, IoT devices, and web applications, managing an organizations attack surface has become increasingly vital. Attack Surface Monitoring (ASM) is an essential component of any effective cybersecurity strategy, helping companies stay ahead of threats and protect their valuable assets.
Web3 - a brave new world full of possibilities and potential. Or should we better say: a world full of cryptoscams, ponzyschemes and long-suffering users who have lost their hard-earned money?
pentesting
Recently I discovered my love of using docker to organize all my stuff.