| 
	     You are here  | 
        www.sjoerdlangkemper.nl | ||
| | | | | 
            
              devopsjournal.io
             | 
        |
| | | | | DevCon Romania 2024 - Protect yourself against supply chain attacks | |
| | | | | 
            
              escape.tech
             | 
        |
| | | | | A Pentester is usually expected to be a higher than average user in terms of interaction with an endpoint. For that reason, I decided to add an intermediary step between "Discovery" and "Exploiting" called "Interaction." This article is part of the series "Pentesting GraphQL 101". 1. Pentesting GraphQL 101 Part | |
| | | | | 
            
              www.thezdi.com
             | 
        |
| | | | | ||
| | | | | 
            
              blog.talosintelligence.com
             | 
        |
| | | ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. | ||