Hackerspot

Hackerspot

Home
Podcast
Notes
AI Security
Awareness
Tools
WriteUps
Automation
About

Sitemap - 2025 - Hackerspot

Prowler: Open-Source Multi-Cloud Compliance & Threat Visibility

Practical Examples for Network Recon & Service Identification in C#

Let's Talk About the Security of AI Agents

XSStrike: A Smarter Scanner for Pentesters

Secretive: Protecting SSH Keys on macOS

Practical Port Probing: Build a Fast and Safe TCP Port Scanner in C#

From Vanity to Value: Building Better Security Metrics

A Simple Guide to SSL/TLS

Accepting Risks Forever Is Not Cool

An Analysis of Promptware Attacks Against LLM-Powered Assistants

Cisco’s New Open-Source Cybersecurity LLM Model

Google Calls for Industry-Wide Standards to Eliminate Memory Safety Vulnerabilities

API Security: From Basics to Modern Threats

Mastering Secure Session Management in C# & ASP.NET

Secure Authentication and Authorization in C#

Understanding DDoS: It's Beyond Bandwidth Saturation

Input Validation and Sanitization in C#

SeCoRA: Your AI-Powered Secure Code Review Agent

Understanding the CIA Triad: A Developer’s Approach to Security

Why Security Matters in Software Development

A Security Analysis of Chat Applications

The Career Path of a Security Analyst

What to Expect from Secure Chat Applications

Meta's Content Moderation and the Future of Tech

Coding Interviews for Cybersecurity Roles

Cyber Attacks in Healthcare

© 2026 Hackerspot · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture