
I enjoy programming
I vividly remember interviewing for my second software developer job and being asked "what technologies are you interested in right now?" My answer wa...

I vividly remember interviewing for my second software developer job and being asked "what technologies are you interested in right now?" My answer wa...

Sammy Azdoufal claims he wasn't trying to hack every robot vacuum in the world. He just wanted to remote control his brand-new DJI Romo vacuum with a...

Go 1.26 is here. No fireworks, no paradigm shifts — just a language getting ruthlessly better where it counts. Continue reading on Medium »

A short write up on fuzzing and audio decoding. Continue reading on Medium »
Cross-site scripting (XSS) isn’t just some theoretical threat from a textbook. It’s a code vulnerability where attackers inject malicious… Continue re...

A Deep Technical Analysis of Emerging Vulnerabilities in Agentic AI Infrastructure By Jayavelu Balaji | February 2026 Executive Summary The Model Cont...

When talking about password managers, the discussion often focuses on encryption algorithms, key length, or “zero-knowledge.” Much less often, a more...
How a single misconfigured redirect cost Salesloft 700+ customers their data — the lessons not from the books Continue reading on MERN Mastery »

How AI Code Review Tools Are Catching Bugs That Humans Miss A team of engineers at Stripe discovered a critical race condition in their payment proces...

TL;DR: We built a system that uses LiDAR depth analysis, moiré pattern detection, rolling shutter flicker analysis, and IMU-based human presence verif...
Around November 2025 I stumbled into a tarpit for rude web scrapers: https://maurycyz.com/projects/trap_bots/ Since then I indulged in writing my own,...

The Over-Helpful Doorman: Full Account Takeover in 'Known' CMS Vulnerability ID: CVE-2026-26273 CVSS Score: 9.8 Published: 2026-02-13 CVE-2026-26273 i...
An exploration of the interesting question.

The company said hackers downloaded “a limited number of files” after breaking into an employee’s account. The hacking group ShinyHunters took respons...

The Japanese sex toy maker said a hacker broke into an employee's inbox and stole customer names, email addresses, and correspondence, including order...

By Latent Breach | February 2026 The OWASP Top 10 for LLM Applications got a major overhaul in late 2024. Version 2025 (v2.0) dropped two categories,...
Industrial control systems (ICS), the unsung backbone of global infrastructure, are no longer just operational assets; they are strategic targets. Whe...

CVE-2026-26187: escaping the Lake with a Path Traversal Two-Step Vulnerability ID: CVE-2026-26187 CVSS Score: 8.1 Published: 2026-02-13 A critical pat...

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat I...

Death by Parentheses: The sqlparse Recursive DoS Vulnerability ID: GHSA-27JP-WM6Q-GP25 CVSS Score: 6.5 Published: 2026-02-13 A high-impact Denial of S...
Showing 1 - 20 of 152 articles