News
-
Introducing AMD Instinct MI300X GPUs to the DigitalOcean Bare Metal fleet (www.digitalocean.com)
-
Modernizing push notification API for Teams (devblogs.microsoft.com)
-
GitHub found 39M secret leaks in 2024. Here’s what we’re doing to help (github.blog)
-
GitHub Secret Protection and GitHub Code Security for GitHub Enterprise (github.blog)
-
Find secrets exposed in your organization with the secret risk assessment (github.blog)
-
GitHub Advanced Security is here for GitHub Team organizations (github.blog)
-
Empowering India’s digital future: Our computing curriculum’s impact (www.raspberrypi.org)
-
“You get Instant Purge, and you get Instant Purge!” — all purge methods now available to all customers (blog.cloudflare.com)
-
Crafting Strong DX With Astro Components and TypeScript (css-tricks.com)
-
Protective DNS for the private sector (www.ncsc.gov.uk)
-
New in Chrome 135 (developer.chrome.com)
-
Multi-domain support and filterable changes are now in public preview on GitHub Desktop (github.blog)
-
Get Off My Lawn and Fix Your Vulnerabilities! (snyk.io)
-
Q&A Session with Snyk & John Hammond: Your Fetch the Flag Questions, Answered (snyk.io)
-
What’s My Daily Life Like (in OT DFIR)? (tisiphone.net)
-
Practical Tips on Handling Errors and Exceptions in Python (blog.sentry.io)
-
The Next Evolution of DigitalOcean Kubernetes: Introducing Features that Unlock Superior Scalability for Growing Businesses (www.digitalocean.com)
-
Globalizing Productions with Netflix’s Media Production Suite (netflixtechblog.com)
-
Mobile GraphQL at Meta in 2025 (engineering.fb.com)
-
Cyber Security and Resilience Policy Statement to strengthen regulation of critical sectors (www.ncsc.gov.uk)
-
Worlds Collide: Keyframe Collision Detection Using Style Queries (css-tricks.com)
-
GitHub for Beginners: How to get LLMs to do what you want (github.blog)
-
Closing down Enterprise Cloud Importer (ECI) effective March 31, 2025 (github.blog)
-
Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service (doublepulsar.com)
-
German Doner Kebab - 162,373 breached accounts (haveibeenpwned.com)
-
Weekly Update 445 (troyhunt.com)
-
Foundation Model for Personalized Recommendation (netflixtechblog.com)
-
Automated Visual Regression Testing With Playwright (css-tricks.com)
-
Monki Gras 2025: What I’ve Learned by Building to Last (alexwlchan.net)
-
JavaScript needs Debug IDs (blog.sentry.io)
-
Deprecation of cvss field in security advisories API (github.blog)
-
Repository ownership limits (github.blog)
-
Experience CS: a new way to teach computer science (www.raspberrypi.org)
-
5 GitHub Actions every maintainer needs to know (github.blog)
-
GPT-4o Copilot: Your new code completion model is now generally available (github.blog)
-
How engineers can use one-on-ones with their manager to accelerate career growth (github.blog)
-
Three chapters at Cloudflare: Programmer to CTO to Board of Directors (blog.cloudflare.com)
-
Governance in DevSecOps: Measuring and Improving Security Outcomes (snyk.io)
-
Blasting Past Webp (googleprojectzero.blogspot.com)
-
Use BrowserStack App Automate with Appium UI Tests for .NET MAUI Apps (devblogs.microsoft.com)
-
Transitive dependencies are now available for Maven (github.blog)
-
What's New in WebGPU (Chrome 135) (developer.chrome.com)
-
Project Jengo for Sable — final winners! (blog.cloudflare.com)
-
Dashboard updates: Fewer clicks, more control, faster widget building (blog.sentry.io)
-
Introducing OpenSpartan Forerunner - A MCP Server For Halo Infinite (den.dev)
-
Commands or Events: Which One for Workflow? (codeopinion.com)
-
Exploring new .NET releases with Dev Containers (devblogs.microsoft.com)
-
Whose code am I running in GitHub Actions? (alexwlchan.net)
-
BlueSky InfoSec News List (tisiphone.net)
-
Mastering GitHub Copilot: When to use AI agent mode (github.blog)
-
Build and deploy Remote Model Context Protocol (MCP) servers to Cloudflare (blog.cloudflare.com)
-
Troy Hunt's Mailchimp List - 16,627 breached accounts (haveibeenpwned.com)
-
Open-sourcing OpenPubkey SSH (OPKSSH): integrating single sign-on with SSH (blog.cloudflare.com)
-
Case Study: Combining Cutting-Edge CSS Features Into a “Course Navigation” Component (css-tricks.com)
-
A Sneaky Phish Just Grabbed my Mailchimp Mailing List (troyhunt.com)
-
What's new in DevTools, Chrome 135 (developer.chrome.com)
-
Anomaly Alerts Now in Open Beta: Smarter Monitoring, Fewer False Alarms (blog.sentry.io)
-
What is a Data Poisoning Attack? (snyk.io)
-
Cloudflare incident on March 21, 2025 (blog.cloudflare.com)
-
Easy way to upload, transform and deliver files and images (Sponsored) (davidwalsh.name)
-
Enterprise custom properties, enterprise rulesets, and pull request merge method rule are all now generally available (github.blog)
-
HDR10+ Now Streaming on Netflix (netflixtechblog.com)
-
Xbox + .NET Aspire: Transforming Local Development Practices (devblogs.microsoft.com)
-
A maintainer’s guide to vulnerability disclosure: GitHub tools to make it simple (github.blog)
-
CyberFirst Girls Competition: a proud milestone and exciting future (www.ncsc.gov.uk)
-
Support Logical Shorthands in CSS (css-tricks.com)
-
Security Week 2025: in review (blog.cloudflare.com)
-
New URLPattern API brings improved pattern matching to Node.js and Cloudflare Workers (blog.cloudflare.com)
-
Privileged access workstations: introducing our new set of principles (www.ncsc.gov.uk)
-
Passkeys: they're not perfect but they're getting better (www.ncsc.gov.uk)
-
Passkeys: the promise of a simpler and safer alternative to passwords (www.ncsc.gov.uk)
-
The (developer.chrome.com)
-
CVE-2025-29927 Authorization Bypass in Next.js Middleware (snyk.io)
-
Revisiting CSS border-image (css-tricks.com)
-
Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One (blog.cloudflare.com)
-
RDP without the risk: Cloudflare's browser-based solution for secure third-party access (blog.cloudflare.com)
-
Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist (blog.cloudflare.com)
-
Prepping for post-quantum: a beginner’s guide to lattice cryptography (blog.cloudflare.com)
-
Improving Data Loss Prevention accuracy with AI-powered context analysis (blog.cloudflare.com)
-
Cloudflare is now IRAP assessed at the PROTECTED level, furthering our commitment to the global public sector (blog.cloudflare.com)
-
Weekly Update 444 (troyhunt.com)
-
The Road Not Taken is Guaranteed Minimum Income (blog.codinghorror.com)
-
World Water Day: how GitHub Copilot is helping bring clean water to communities (github.blog)
-
Timelines for migration to post-quantum cryptography (www.ncsc.gov.uk)
-
Three ways to help students learn about the impact of technology (www.raspberrypi.org)
-
Powering AI Innovation: DigitalOcean Bare Metal GPUs in EU Data Center (www.digitalocean.com)
-
Cloudflare named a leader in Web Application Firewall Solutions in 2025 Forrester report (blog.cloudflare.com)
-
Quick Reminder That :is() and :where() Are Basically the Same With One Key Difference (css-tricks.com)
-
Introducing Cloudy, Cloudflare’s AI agent for simplifying complex configurations (blog.cloudflare.com)
-
HTTPS-only for Cloudflare APIs: shutting the door on cleartext traffic (blog.cloudflare.com)
-
Simplify allowlist management and lock down origin access with Cloudflare Aegis (blog.cloudflare.com)
-
Making Application Security simple with a new unified dashboard experience (blog.cloudflare.com)
-
Setting direction for the UK's migration to post-quantum cryptography (www.ncsc.gov.uk)
-
A different future for telecoms in the UK (www.ncsc.gov.uk)
-
Security, complexity and Huawei; protecting the UK's telecoms networks (www.ncsc.gov.uk)
-
Use of Russian technology products and services following the invasion of Ukraine (www.ncsc.gov.uk)
-
The future of telecoms in the UK (www.ncsc.gov.uk)
-
So long and thanks for all the bits (www.ncsc.gov.uk)
-
TLS 1.3: better for individuals - harder for enterprises (www.ncsc.gov.uk)
-
The contenteditable "plaintext-only" attribute value combination is now Baseline Newly available (web.dev)
-
Carousels with CSS (developer.chrome.com)
-
Improved support for private applications and reusable access policies with Cloudflare Access (blog.cloudflare.com)
-
Yes, That’s Me on Your Radio! (tisiphone.net)
-
SpyX - 1,977,011 breached accounts (haveibeenpwned.com)
-
Video: How to create checklists in Markdown for easier task tracking (github.blog)
-
MSTest 3.8: Top 10 features to supercharge your .NET tests! (devblogs.microsoft.com)
-
Scale into the stratosphere: Managed MySQL & PostgreSQL now support up to 20TB and 30TB (www.digitalocean.com)
-
Screaming Architecture: Not Driven By Entities (codeopinion.com)
-
IssueOps: Automate CI/CD (and more!) with GitHub Issues and Actions (github.blog)
-
Improved navigation and filtering in the DevTools Performance panel (developer.chrome.com)
-
Memory safety for web fonts (developer.chrome.com)
-
Updated InfoSec Mastodon Lists! (tisiphone.net)
-
Lexipol - 672,546 breached accounts (haveibeenpwned.com)
-
.NET 10 Preview 2 is now available! (devblogs.microsoft.com)
-
.NET 10 Preview 2
(github.com)
-
How to think about Baseline and polyfills (web.dev)
-
Shape the future of the web with GSoC and Chromium (developer.chrome.com)
-
PlayStation, Xbox, Switch, PC, or Mobile — wherever you’ve got bugs to crush, Sentry can help (blog.sentry.io)
-
Ten Years of Let's Encrypt: Announcing support from Jeff Atwood (letsencrypt.org)
-
Acquiring Tokens For Non-Graph APIs In Azure Functions (den.dev)
-
GPU Droplets Achieve SOC 2 Compliance (www.digitalocean.com)
-
Styling Counters in CSS (css-tricks.com)
-
GitHub for Beginners: Essential features of GitHub Copilot (github.blog)
-
Changes to remote debugging switches to improve security (developer.chrome.com)
-
AI's effects on programming jobs (seldo.com)
-
Weekly Update 443 (troyhunt.com)
-
Python 3.14.0 alpha 6 is out (pythoninsider.blogspot.com)
-
Web Components Demystified (css-tricks.com)
-
Using Microsoft Entra ID To Authenticate With MCP Servers Via Sessions (den.dev)
-
Fast and random sampling in SQLite (alexwlchan.net)
-
Introducing support for SLNX, a new, simpler solution file format in the .NET CLI (devblogs.microsoft.com)
-
DigitalOcean Managed MongoDB now supports MongoDB 8.0 (www.digitalocean.com)
-
PCI DSS FAQ SAQ WTF BBQ... (scotthelme.ghost.io)
-
Thinking about the security of AI systems (www.ncsc.gov.uk)
-
There's a hole in my bucket (www.ncsc.gov.uk)
-
The problems with patching (www.ncsc.gov.uk)
-
The strength of the ICS COI is the team (www.ncsc.gov.uk)
-
The security benefits of modern collaboration in the cloud (www.ncsc.gov.uk)
-
The problems with forcing regular password expiry (www.ncsc.gov.uk)
-
The logic behind three random words (www.ncsc.gov.uk)
-
The future of Technology Assurance in the UK (www.ncsc.gov.uk)
-
The Cyber Assessment Framework 3.1 (www.ncsc.gov.uk)
-
Thanking the vulnerability research community with NCSC Challenge Coins (www.ncsc.gov.uk)
-
Terminology: it's not black and white (www.ncsc.gov.uk)
-
Telling users to ‘avoid clicking bad links’ still isn’t working (www.ncsc.gov.uk)
-
Tackling the 'human factor' to transform cyber security behaviours (www.ncsc.gov.uk)
-
Supplier assurance: having confidence in your suppliers (www.ncsc.gov.uk)
-
Studies in secure system design (www.ncsc.gov.uk)
-
Spotlight on shadow IT (www.ncsc.gov.uk)
-
Smart devices: new law helps citizens to choose secure products (www.ncsc.gov.uk)
-
SCADA 'in the cloud': new guidance for OT organisations (www.ncsc.gov.uk)
-
SBOMs and the importance of inventory (www.ncsc.gov.uk)
-
RITICS: Securing cyber-physical systems (www.ncsc.gov.uk)
-
Revolutionising identity services using AI (www.ncsc.gov.uk)
-
Researching the hard problems in hardware security (www.ncsc.gov.uk)
-
Relaunching the NCSC's Cloud security guidance collection (www.ncsc.gov.uk)
-
Refreshed 'cyber security toolkit' helps board members to govern online risk (www.ncsc.gov.uk)
-
Ransomware and the cyber crime ecosystem (www.ncsc.gov.uk)
-
Raising the cyber resilience of software 'at scale' (www.ncsc.gov.uk)
-
QR Codes - what's the real risk? (www.ncsc.gov.uk)
-
Protecting how you administer cloud services (www.ncsc.gov.uk)
-
Protecting PBX from cyber attacks (www.ncsc.gov.uk)
-
Protecting parked domains for the UK public sector (www.ncsc.gov.uk)
-
Protecting internet-facing services on public service CNI (www.ncsc.gov.uk)
-
Protect your management interfaces (www.ncsc.gov.uk)
-
Protect your customers to protect your brand (www.ncsc.gov.uk)
-
Products on your perimeter considered harmful (until proven otherwise) (www.ncsc.gov.uk)
-
Principles and how they can help us with assurance (www.ncsc.gov.uk)
-
Preparing for the long haul: the cyber threat from Russia (www.ncsc.gov.uk)
-
Post-quantum cryptography: what comes next? (www.ncsc.gov.uk)
-
Pathways: exploring a new way to achieve Cyber Essentials certification (www.ncsc.gov.uk)
-
Our new principles to help make cloud backups more resilient (www.ncsc.gov.uk)
-
Offline backups in an online world (www.ncsc.gov.uk)
-
New Python Driver for SQL Server and Azure SQL! (devblogs.microsoft.com)
-
Hello HybridCache! Streamlining Cache Management for ASP.NET Core Applications (devblogs.microsoft.com)
-
Not all types of MFA are created equal... (www.ncsc.gov.uk)
-
New techniques added to the NCSC’s ‘risk management toolbox’ (www.ncsc.gov.uk)
-
New legislation will help counter the cyber threat to our essential services (www.ncsc.gov.uk)
-
New guidance for practitioners supporting victims of 'domestic cyber crime' (www.ncsc.gov.uk)
-
New cyber security training packages launched to manage supply chain risk (www.ncsc.gov.uk)
-
New cloud guidance: how to 'lift and shift' successfully (www.ncsc.gov.uk)
-
New 'Connected Places' infographic published (www.ncsc.gov.uk)
-
NCSC’s Cyber Advisor scheme milestone (www.ncsc.gov.uk)
-
NCSC's cyber security training for staff now available (www.ncsc.gov.uk)
-
NCSC IT: There's confidence and then there's SaaS (www.ncsc.gov.uk)
-
NCSC For Startups: Vistalworks cracking down on illicit trade (www.ncsc.gov.uk)
-
NCSC For Startups: the feedback loop (www.ncsc.gov.uk)
-
NCSC for Startups: the case for collaboration (www.ncsc.gov.uk)
-
NCSC For Startups: taking on malvertising (www.ncsc.gov.uk)
-
NCSC For Startups diaries: PORGiESOFT (www.ncsc.gov.uk)
-
How Rebellion Defence used NCSC For Startups to accelerate product development (www.ncsc.gov.uk)
-
NCSC for Startups: an ecosystem-based approach to cyber security (www.ncsc.gov.uk)
-
Mythbusting cloud key management services (www.ncsc.gov.uk)
-
Moving to a cloud, not a storm (www.ncsc.gov.uk)
-
Motivating developers to write secure code (www.ncsc.gov.uk)
-
Migrating to post-quantum cryptography (www.ncsc.gov.uk)
-
Mastering your supply chain (www.ncsc.gov.uk)
-
Market incentives in the pursuit of resilient software and hardware (www.ncsc.gov.uk)
-
Making the UK the safest place to live and do business online (www.ncsc.gov.uk)
-
Making Principles Based Assurance a reality (www.ncsc.gov.uk)
-
Machine learning security principles updated (www.ncsc.gov.uk)
-
Looking back at the ballot – securing the general election (www.ncsc.gov.uk)
-
Log4j vulnerability: what should boards be asking? (www.ncsc.gov.uk)
-
Leveraging NCSC’s national insight to strengthen the fight against mobile threats (www.ncsc.gov.uk)
-
Introducing the guidelines for secure AI (www.ncsc.gov.uk)
-
Introducing Scanning Made Easy (www.ncsc.gov.uk)
-
Introducing PDNS for Schools (www.ncsc.gov.uk)
-
Introducing Cyber Advisors... (www.ncsc.gov.uk)
-
Introducing Active Cyber Defence 2.0 (www.ncsc.gov.uk)
-
Interactive administration in the cloud: managing the risks (www.ncsc.gov.uk)
-
Intelligent security tools: are they a smart choice for you? (www.ncsc.gov.uk)
-
Identifying suspicious credential usage (www.ncsc.gov.uk)
-
How to talk to board members about cyber (www.ncsc.gov.uk)
-
How the NCSC thinks about security architecture (www.ncsc.gov.uk)
-
How CyberFish's founder got hooked on Cheltenham (www.ncsc.gov.uk)
-
Helping banish malicious adverts – and drive a secure advertising ecosystem (www.ncsc.gov.uk)
-
Helping organisations - and researchers - to manage vulnerability disclosure (www.ncsc.gov.uk)
-
Growing positive security cultures (www.ncsc.gov.uk)
-
Funded cyber certification helps small charities to provide legal aid to vulnerable citizens (www.ncsc.gov.uk)
-
From the cyber proliferation threat all the way to Pall Mall (www.ncsc.gov.uk)
-
Exercise caution when building off LLMs (www.ncsc.gov.uk)
-
Erasing data from donated devices (www.ncsc.gov.uk)
-
Eradicating trivial vulnerabilities, at scale (www.ncsc.gov.uk)
-
Equities process (www.ncsc.gov.uk)
-
Early Warning is joining MyNCSC (www.ncsc.gov.uk)
-
Drawing good architecture diagrams (www.ncsc.gov.uk)
-
Digital twins: secure design and development (www.ncsc.gov.uk)
-
Defending software build pipelines from malicious attack (www.ncsc.gov.uk)
-
Data-driven cyber: empowering government security with focused insights from data (www.ncsc.gov.uk)
-
New interactive video - and related downloads - to help secondary school kids stay safe online (www.ncsc.gov.uk)
-
CyberFirst industries support CyberTV for students (www.ncsc.gov.uk)
-
Cyber Security Toolkit for Boards: updated briefing pack released (www.ncsc.gov.uk)
-
Cyber security for schools (www.ncsc.gov.uk)
-
Cyber Resilience Audit scheme open to applications (www.ncsc.gov.uk)
-
Cyber Resilience Audit (CRA) scheme launches for assured CAF-based audits (www.ncsc.gov.uk)
-
Cyber Essentials: are there any alternative standards? (www.ncsc.gov.uk)
-
Cyber Essentials Plus is for charities too! (www.ncsc.gov.uk)
-
Cyber Essentials 'Pathways': From experiment to proof of concept (www.ncsc.gov.uk)
-
Cyber Assessment Framework 3.2 (www.ncsc.gov.uk)
-
CNI system design: Secure Remote Access (www.ncsc.gov.uk)
-
Cloud security made easier with Serverless (www.ncsc.gov.uk)
-
Check your email security, and protect your customers (www.ncsc.gov.uk)
-
ChatGPT and large language models: what's the risk? (www.ncsc.gov.uk)
-
Bring Your Own Device: How to do it well (www.ncsc.gov.uk)
-
Business email compromise: new guidance to protect your organisation (www.ncsc.gov.uk)
-
Building Web Check using PaaS (www.ncsc.gov.uk)
-
Building on our history of cryptographic research (www.ncsc.gov.uk)
-
Building a nation-scale evidence base for cyber deception (www.ncsc.gov.uk)
-
Are you hungry? A two-part blog about risk appetites (www.ncsc.gov.uk)
-
Applying the Cloud Security Principles in practice: a case study (www.ncsc.gov.uk)
-
Announcing IASME as our second Delivery Partner for Cyber Incident Response Level 2 (www.ncsc.gov.uk)
-
An RFC on IoCs – playing our part in international standards (www.ncsc.gov.uk)
-
AIT fraud: what you need to know (www.ncsc.gov.uk)
-
Artificial Intelligence: 'call for views' on the cyber security of AI closes soon (www.ncsc.gov.uk)
-
Advanced Mobile Solutions (AMS) guidance trailer (www.ncsc.gov.uk)
-
Active Cyber Defence: Sixth annual report now available (www.ncsc.gov.uk)
-
ACD 2.0: Insights from the external attack surface management trials (www.ncsc.gov.uk)
-
ACD 2.0 exploration into attack surface management completed (www.ncsc.gov.uk)
-
Accessibility as a cyber security priority (www.ncsc.gov.uk)
-
A problem shared is . . . in the research problem book (www.ncsc.gov.uk)
-
A decade of Cyber Essentials: the journey towards a safer digital future (www.ncsc.gov.uk)
-
'PDNS for Schools' to provide cyber resilience for more institutions (www.ncsc.gov.uk)
-
'NCSC Cyber Series' podcast now available (www.ncsc.gov.uk)
-
"Winning trust, and making powerful connections" (www.ncsc.gov.uk)
-
"What's happened to my data?" (www.ncsc.gov.uk)
-
"If you have knowledge, let others light their candles in it." (www.ncsc.gov.uk)
-
Vendor Security Assessment (www.ncsc.gov.uk)
-
Threat report on application stores (www.ncsc.gov.uk)
-
The threat from commercial cyber proliferation (www.ncsc.gov.uk)
-
The near-term impact of AI on the cyber threat (www.ncsc.gov.uk)
-
The cyber threat to Universities (www.ncsc.gov.uk)
-
The Cyber Threat to UK Business (www.ncsc.gov.uk)
-
The cyber threat to sports organisations (www.ncsc.gov.uk)
-
Summary of the NCSC analysis of May 2020 US sanction (www.ncsc.gov.uk)
-
Summary of NCSC’s security analysis for the UK telecoms sector (www.ncsc.gov.uk)
-
Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking (www.ncsc.gov.uk)
-
Organisational use of Enterprise Connected Devices (www.ncsc.gov.uk)
-
Joint report on publicly available hacking tools (www.ncsc.gov.uk)
-
Incident trends report (October 2018 - April 2019) (www.ncsc.gov.uk)
-
High level privacy and security design for NHS COVID-19 contact tracing app (www.ncsc.gov.uk)
-
Decrypting diversity: Diversity and inclusion in cyber security report 2020 (www.ncsc.gov.uk)
-
Decrypting diversity: Diversity and inclusion in cyber security report 2021 (www.ncsc.gov.uk)
-
Cyber Threat Report: UK Legal Sector (www.ncsc.gov.uk)
-
Active Cyber Defence (ACD) - The Second Year (www.ncsc.gov.uk)
-
Active Cyber Defence (ACD) - The Third Year (www.ncsc.gov.uk)
-
ACD - The Sixth Year (www.ncsc.gov.uk)
-
Active Cyber Defence (ACD) - the fourth year (www.ncsc.gov.uk)
-
ACD - The Fifth Year (www.ncsc.gov.uk)
-
A method to assess 'forgivable' vs 'unforgivable' vulnerabilities (www.ncsc.gov.uk)
-
Celebrating young tech creators at Coolest Projects Ireland 2025 (www.raspberrypi.org)
-
Zero trust: building a mixed estate (www.ncsc.gov.uk)
-
What is an antivirus product? Do I need one? (www.ncsc.gov.uk)
-
Ransomware: 'WannaCry' guidance for home users and small businesses (www.ncsc.gov.uk)
-
Vulnerability scanning tools and services (www.ncsc.gov.uk)
-
Video conferencing services: using them securely (www.ncsc.gov.uk)
-
Video conferencing services: security guidance for organisations (www.ncsc.gov.uk)
-
Using IPsec to protect data (www.ncsc.gov.uk)
-
Using TLS to protect data (www.ncsc.gov.uk)
-
Transaction Monitoring for online services (www.ncsc.gov.uk)
-
Takedown: removing malicious content to protect your brand (www.ncsc.gov.uk)
-
Systems administration architectures (www.ncsc.gov.uk)
-
Supplier assurance questions (www.ncsc.gov.uk)
-
Social media: protecting what you publish (www.ncsc.gov.uk)
-
Social Media: how to use it safely (www.ncsc.gov.uk)
-
Smart devices: using them safely in your home (www.ncsc.gov.uk)
-
Shopping and paying safely online (www.ncsc.gov.uk)
-
Shadow IT (www.ncsc.gov.uk)
-
Sextortion emails: how to protect yourself (www.ncsc.gov.uk)
-
Setting up 2-Step Verification (2SV) (www.ncsc.gov.uk)
-
Securing your devices (www.ncsc.gov.uk)
-
Secure sanitisation and disposal of storage media (www.ncsc.gov.uk)
-
Secure communications principles (www.ncsc.gov.uk)
-
Scam 'missed parcel' SMS messages: advice on avoiding malware (www.ncsc.gov.uk)
-
ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance (www.ncsc.gov.uk)
-
Responding to a cyber incident – a guide for CEOs (www.ncsc.gov.uk)
-
Reducing data exfiltration by malicious insiders (www.ncsc.gov.uk)
-
Recovering a hacked account (www.ncsc.gov.uk)
-
Putting staff welfare at the heart of incident response (www.ncsc.gov.uk)
-
Provisioning and securing security certificates (www.ncsc.gov.uk)
-
Protecting SMS messages used in critical business processes (www.ncsc.gov.uk)
-
Private Branch Exchange (PBX) best practice (www.ncsc.gov.uk)
-
Preventing Lateral Movement (www.ncsc.gov.uk)
-
Phishing attacks: defending your organisation (www.ncsc.gov.uk)
-
Penetration testing (www.ncsc.gov.uk)
-
Pattern: Safely Importing Data (www.ncsc.gov.uk)
-
Operational technologies (www.ncsc.gov.uk)
-
Online gaming for families and individuals (www.ncsc.gov.uk)
-
Network security fundamentals (www.ncsc.gov.uk)
-
NCSC advice: Malicious software used to illegally mine cryptocurrency (www.ncsc.gov.uk)
-
NCSC advice for Dixons Carphone plc customers (www.ncsc.gov.uk)
-
NCSC advice on the use of equipment from high risk vendors in UK telecoms networks (www.ncsc.gov.uk)
-
NCSC advice for Marriott International customers (www.ncsc.gov.uk)
-
Moving your business from the physical to the digital (www.ncsc.gov.uk)
-
Mitigating malware and ransomware attacks (www.ncsc.gov.uk)
-
MIKEY-SAKKE frequently asked questions (www.ncsc.gov.uk)
-
Mapping your supply chain (www.ncsc.gov.uk)
-
Managing the risk of cloud-enabled products (www.ncsc.gov.uk)
-
Managing Public Domain Names (www.ncsc.gov.uk)
-
Maintaining a sustainable strengthened cyber security posture (www.ncsc.gov.uk)
-
Macro Security for Microsoft Office (www.ncsc.gov.uk)
-
'Krack' Wi-Fi guidance (www.ncsc.gov.uk)
-
Introduction to logging for security purposes (www.ncsc.gov.uk)
-
Introduction to identity and access management (www.ncsc.gov.uk)
-
How to spot scammers claiming to be from the NCSC (www.ncsc.gov.uk)
-
How to recover an infected device (www.ncsc.gov.uk)
-
Home working: preparing your organisation and staff (www.ncsc.gov.uk)
-
Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances (www.ncsc.gov.uk)
-
Guidance for organisations considering payment in ransomware incidents (www.ncsc.gov.uk)
-
Guidance for brands to help advertising partners counter malvertising (www.ncsc.gov.uk)
-
Guidance following recent DoS attacks in the run up to the 2019 General Election (www.ncsc.gov.uk)
-
GDPR security outcomes (www.ncsc.gov.uk)
-
Effective steps to cyber exercise creation (www.ncsc.gov.uk)
-
Guidance on effective communications in a cyber incident (www.ncsc.gov.uk)
-
Early Years practitioners: using cyber security to protect your settings (www.ncsc.gov.uk)
-
Design Pattern: Safely Exporting Data (www.ncsc.gov.uk)
-
Design guidelines for high assurance products (www.ncsc.gov.uk)
-
Dealing with the SolarWinds Orion compromise (www.ncsc.gov.uk)
-
Data breaches: guidance for individuals and families (www.ncsc.gov.uk)
-
Cyber security for major events (www.ncsc.gov.uk)
-
Cyber security for high profile conferences (www.ncsc.gov.uk)
-
Cyber security for farmers (www.ncsc.gov.uk)
-
Cyber security for construction businesses (www.ncsc.gov.uk)
-
Cyber insurance guidance (www.ncsc.gov.uk)
-
Configuring Microsoft Outlook 365's 'Report Phishing' add-in (www.ncsc.gov.uk)
-
Buying and selling second-hand devices (www.ncsc.gov.uk)
-
Business email compromise: defending your organisation (www.ncsc.gov.uk)
-
Business communications - SMS and telephone best practice (www.ncsc.gov.uk)
-
Building and operating a secure online service (www.ncsc.gov.uk)
-
Engaging with Boards to improve the management of cyber security risk (www.ncsc.gov.uk)
-
Authentication methods: choosing the right type (www.ncsc.gov.uk)
-
Asset management (www.ncsc.gov.uk)
-
Approaching enterprise technology with cyber security in mind (www.ncsc.gov.uk)
-
AI and cyber security: what you need to know (www.ncsc.gov.uk)
-
Advice for End Users (www.ncsc.gov.uk)
-
Actions to take when the cyber threat is heightened (www.ncsc.gov.uk)
-
Acquiring, managing, and disposing of network devices (www.ncsc.gov.uk)
-
'Smart' security cameras: Using them safely in your home (www.ncsc.gov.uk)
-
Support for CSS and Baseline has shipped in ESLint (web.dev)
-
We all lose when art is anonymised (alexwlchan.net)
-
.NET and .NET Framework March 2025 servicing releases updates (devblogs.microsoft.com)
-
Soft-Launching and Open Sourcing the Have I Been Pwned Rebrand (troyhunt.com)
-
Do you really need that abstraction or generic code? (YAGNI) (codeopinion.com)
-
Powering Search With Astro Actions and Fuse.js (css-tricks.com)
-
Report URI: Launching Policy Watch and other improvements! (scotthelme.ghost.io)
-
New in Chrome Q1 2025: CSS text-box, file system access for Android, Baseline updates and more! (developer.chrome.com)
-
Introducing a Managed Component for Maintaining Host Routes in Kubernetes (www.digitalocean.com)
-
Smashing Meets Accessibility (css-tricks.com)
-
An unexpected lesson in CSS stacking contexts (alexwlchan.net)
-
No, there isn’t a world ending Apache Camel vulnerability (doublepulsar.com)
-
Weekly Update 442 (troyhunt.com)
-
Powered by DigitalOcean Hatch: How Ex-human uses GPU Droplets to Build Empathetic AI that Serves Customers (www.digitalocean.com)
-
A CSS-Only Star Rating Component and More! (Part 2) (css-tricks.com)
-
Creating static map images with OpenStreetMap, Web Mercator, and Pillow (alexwlchan.net)
-
Why I won't be attending PyCon US this year (snarky.ca)
-
.NET AI Template Now Available in Preview (devblogs.microsoft.com)
-
Maybe don’t use custom properties in shorthand properties (css-tricks.com)
-
Integrating generative AI into introductory programming classes (www.raspberrypi.org)
-
Tails 6.13 (tails.net)
-
Vulnerability Scanning: Keeping on top of the most common threats (www.ncsc.gov.uk)
-
Let's Talk About The American Dream (blog.codinghorror.com)
-
Python in Visual Studio Code – March 2025 Release (devblogs.microsoft.com)
-
Grouping Selection List Items Together With CSS Grid (css-tricks.com)
-
Use one Virtual Machine to own them all — active exploitation of ESXicape (doublepulsar.com)
-
Zero trust 1.0 (www.ncsc.gov.uk)
-
Why cloud first is not a security problem (www.ncsc.gov.uk)
-
Protecting system administration with PAM (www.ncsc.gov.uk)
-
Title Launch Observability at Netflix Scale (netflixtechblog.com)
-
Using Microsoft Entra ID To Authenticate With Model Context Protocol Servers (den.dev)
-
DRY principle is why your codebase sucks? (codeopinion.com)
-
Building multimodal AI for Ray-Ban Meta glasses (engineering.fb.com)
-
A case for QLC SSDs in the data center (engineering.fb.com)
-
Let's Encrypt to offer 6-day certificates! (scotthelme.ghost.io)
-
We're Backfilling and Cleaning Stealer Logs in Have I Been Pwned (troyhunt.com)
-
Scale smarter with DigitalOcean's latest networking upgrades (www.digitalocean.com)
-
Functions in CSS?! (css-tricks.com)
-
Sharks of DigitalOcean: Apple Li, Director of Financial Planning and Analysis (FP&A) (www.digitalocean.com)
-
Color Dating - 220,503 breached accounts (haveibeenpwned.com)
-
Flat Earth Sun, Moon and Zodiac App - 33,294 breached accounts (haveibeenpwned.com)
-
New to the web platform in February (web.dev)
-
Weekly Update 441 (troyhunt.com)
-
AI Agents: Hype or Reality? (blog.sentry.io)
-
The Missing Intro To Flexible Federated Identity Credentials (den.dev)
-
Spyzie - 518,643 breached accounts (haveibeenpwned.com)
-
Experience AI: The story so far (www.raspberrypi.org)
-
February 2025 Baseline monthly digest (web.dev)
-
Orange Romania - 556,557 breached accounts (haveibeenpwned.com)
-
Terminal Chat now included in GitHub Copilot Free (devblogs.microsoft.com)
-
Why AI Can’t Replace Cybersecurity Analysts (tisiphone.net)
-
The Phillip Wylie Show! (tisiphone.net)
-
Updating to Pi-hole v6 and enabling HTTPS! (scotthelme.ghost.io)
-
Distributed Systems Consistency: Mistake Nobody Warns You About! (codeopinion.com)
-
ALIEN TXTBASE Stealer Logs - 284,132,969 breached accounts (haveibeenpwned.com)
-
.NET 10 Release Index
(github.com)
-
.NET 10 Preview 1
(github.com)
-
Processing 23 Billion Rows of ALIEN TXTBASE Stealer Logs (troyhunt.com)
-
How Meta is translating its Java codebase to Kotlin (engineering.fb.com)
-
Teaching about AI – Teacher symposium (www.raspberrypi.org)
-
Weekly Update 440 (troyhunt.com)
-
Using PostHog in your .NET applications (haacked.com)
-
Fix slow mobile apps before your users uninstall with Mobile Vitals (blog.sentry.io)
-
A Million Little Secrets (www.joshwcomeau.com)
-
How I Automated My Podcast Transcript Production With Local AI (den.dev)
-
It’s cool to care (alexwlchan.net)
-
ruby-align is Baseline Newly available (web.dev)
-
React.js Performance Guide (blog.sentry.io)
-
Spyic - 875,999 breached accounts (haveibeenpwned.com)
-
Cocospy - 1,798,059 breached accounts (haveibeenpwned.com)
-
Cosmetic updates to this site (alexwlchan.net)
-
We Issued Our First Six Day Cert (letsencrypt.org)
-
Multi-Tenant: Database Per Tenant or Shared? (codeopinion.com)
-
Last chance for online career mentorship, for a while (tisiphone.net)
-
Podcast: Expanding Frontiers Research (tisiphone.net)
-
What exactly should we be logging? (www.ncsc.gov.uk)
-
How I create static websites for tiny archives (alexwlchan.net)
-
Code Club: Empowering the Next Generation of Digital Creators (www.raspberrypi.org)
-
Breakpoint recap: Uptime Monitoring, robots, and feature flags galore (blog.sentry.io)
-
Replacing balenaEtcher with Rufus as installer for Windows (tails.net)
-
Protecting user data through source code analysis at scale (engineering.fb.com)
-
Introducing Bare Metal Systems Built on NVIDIA HGX H200 (www.digitalocean.com)
-
Government’s Cloud First Policy is 12! (technology.blog.gov.uk)
-
DeckSurf Now Supports All Stream Deck Devices (den.dev)
-
On Cybersecurity Mentorship (tisiphone.net)
-
A Very Personal Interview with SecurityWeek Magazine (tisiphone.net)
-
Storenvy - 11,052,071 breached accounts (haveibeenpwned.com)
-
Weekly Update 439 (troyhunt.com)
-
Introducing Impressions at Netflix (netflixtechblog.com)
-
Unlocking global AI potential with next-generation subsea infrastructure (engineering.fb.com)
-
Encryption for Everybody (letsencrypt.org)
-
Harnessing The LLM - Rebuilding My Podcast Website In Two Evenings And Not Two Weeks (den.dev)
-
Looking back at our Bug Bounty program in 2024 (engineering.fb.com)
-
Teaching about AI in K–12 education: Thoughts from the USA (www.raspberrypi.org)
-
Interop 2025: another year of web platform improvements (web.dev)
-
Doxbin (TOoDA) - 136,461 breached accounts (haveibeenpwned.com)
-
Zacks (2024) - 11,994,223 breached accounts (haveibeenpwned.com)
-
Introducing Bitbucket Integration for App Platform (www.digitalocean.com)
-
PostgreSQL 17 is now Available for DigitalOcean Managed PostgreSQL (www.digitalocean.com)
-
Python 3.14.0 alpha 5 is out (pythoninsider.blogspot.com)
-
Teaching AI safety: Lessons from Romanian educators (www.raspberrypi.org)
-
LandAirSea - 337,373 breached accounts (haveibeenpwned.com)
-
Your App Might Be Down; Let's Fix It – Introducing Sentry Uptime Monitoring (blog.sentry.io)
-
Adopt Me Trading Values - 86,136 breached accounts (haveibeenpwned.com)
-
Weekly Update 438 (troyhunt.com)
-
Youthmanual - 937,912 breached accounts (haveibeenpwned.com)
-
Good embedded toots (alexwlchan.net)
-
Unexpected errors in the BagIt area (alexwlchan.net)
-
Anthropic and DeepSeek Join the GenAI Platform Model Library (www.digitalocean.com)
-
The Popover API is now Baseline Newly available (web.dev)
-
How to Debug and Log in PHP (blog.sentry.io)
-
Python in Visual Studio Code – February 2025 Release (devblogs.microsoft.com)
-
Thermomix Recipe World Forum - 3,123,439 breached accounts (haveibeenpwned.com)
-
Currents Report: How Growing Tech Businesses Use AI Today (www.digitalocean.com)
-
Hakko Corporation - 9,665 breached accounts (haveibeenpwned.com)
-
Windows Terminal Preview 1.23 Release (devblogs.microsoft.com)
-
Tails 6.12 (tails.net)
-
Persistence Ignorance is Overrated (codeopinion.com)
-
Revolutionizing software testing: Introducing LLM-powered bug catchers (engineering.fb.com)
-
Using a transformer–based text embeddings model to reduce Sentry alerts by 40% and cut through noise (blog.sentry.io)
-
Sharks of DigitalOcean: Vasily Prokopov, Staff Solutions Engineer (www.digitalocean.com)
-
Mypy 1.15 Released (mypy-lang.org)
-
A Simple Way GitHub Copilot @vision Helped Me Be More Productive (den.dev)
-
Data logs: The latest evolution in Meta’s access tools (engineering.fb.com)
-
Python 3.13.2 and 3.12.9 now available! (pythoninsider.blogspot.com)
-
Making inventory spreadsheets for my LEGO sets (alexwlchan.net)
-
PoinCampus - 89,116 breached accounts (haveibeenpwned.com)
-
Maintain smooth game play with Sentry's game engine support (blog.sentry.io)
-
How to get metrics, groups and alerts from your spans in Trace Explorer (blog.sentry.io)
-
Stronger Than Ever: How We Turned a DDoS Attack Into a Lesson in Resilience (scotthelme.ghost.io)
-
Weekly Update 437 (troyhunt.com)
-
Adding auto-generated cover images to EPUBs downloaded from AO3 (alexwlchan.net)
-
CSS scrollbar-gutter and scrollbar-width are Baseline Newly available (web.dev)