TechSplicer

πŸ” Web Dev turned Security Researcher | Breaking down vulnerabilities through a developer's lens.

TechSplicertechsplicer
2025-03-28
TechSplicertechsplicer
2025-03-25

πŸ” Just published my latest case study on pentesting a Windows application! Discoveries:

πŸ‘” Disabled security flags, that lead to uncovering of many high risk vulnerabilities
πŸ” Plaintext credentials
πŸšͺ A backdoor that bypasses authentication

Read more: πŸ”— techsplicer.com/career-hub/pen

TechSplicertechsplicer
2025-03-11

Mitigation Strategies for Desktop and Web Applications - practical security approaches for developers and architects to protect against common vulnerabilities.

Check it out here: techsplicer.com/career-hub/mit

πŸ›‘οΈ

TechSplicertechsplicer
2025-01-22

πŸ” The Mathematics of Password Security: A Simple Truth

techsplicer.com/cybersecurity-

πŸ”‘ Tl;dr: Length beats complexity!

TechSplicertechsplicer
2025-01-10

DORA 2025: Reshaping the financial sector's digital resilience landscape

Key changes ahead for EU financial entities:
πŸ” Enhanced ICT risk management
🚨 Incident reporting standards
🀝 Third-party risk oversight
πŸ“‹ Testing requirements

πŸ”— techsplicer.com/career-hub/dor

TechSplicertechsplicer
2025-01-08

πŸ” Always On Guard: The Mental Health Cost of Cyber Threat Awareness

🧠 An important discussion on how constant vigilance impacts our mental wellbeing.

techsplicer.com/insights/cyber

TechSplicertechsplicer
2025-01-08

πŸ›‘οΈ Security Scanner for Web Applications
πŸ”’ Privacy-First Security Analysis πŸ‘©β€πŸ’» Built by Developers, for Developers

Try it now: webscan.dev

TechSplicertechsplicer
2025-01-03

πŸ“ The Psychology of Phishing: Why Smart People Fall for Scams

🧠 Exploring how mental exhaustion makes us vulnerable to phishing attacks, with practical tips to protect yourself

πŸ”— techsplicer.com/insights/the-p

TechSplicertechsplicer
2024-12-19

πŸ”„ Self-Designing Software

Code that learns to rebuild itself on the fly - hot-swapping pieces to match real-world conditions πŸ› οΈ

cacm.acm.org/research/self-des

TechSplicertechsplicer
2024-12-18
TechSplicertechsplicer
2024-12-17

Which AI Companies Are the Safestβ€”and Least Safe?

time.com/7202030/ai-companies-

TechSplicertechsplicer
2024-12-17
TechSplicertechsplicer
2024-12-16
TechSplicer boosted:
2024-12-15
TechSplicertechsplicer
2024-12-15

It's Surprisingly Easy to Jailbreak LLM-Driven Robots Researchers induced bots to ignore their safeguards without exception

spectrum.ieee.org/jailbreak-llm

TechSplicertechsplicer
2024-12-14
TechSplicertechsplicer
2024-12-11

πŸ“Š NEW RESEARCH: Investigation uncovers sophisticated technical infrastructure behind Meta's influence operation in Romania's 2024 election.

πŸ”— techsplicer.com/news/metas-rol

TechSplicertechsplicer
2024-12-11

🚨 Romania's largest power distributor Electrica (4M+ users) confirms ransomware attack. Critical systems secure, but incident follows 85k+ cyber attacks on election infrastructure.

More: techsplicer.com/news/romanias-

TechSplicertechsplicer
2024-12-09

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst