20 Followers
170 Following
41 Posts

🔐 Code breaker & bug hunter | Dev perspective on security research

Follow my blog content @techsplicer

#CyberSecurity #EthicalHacking #webdev #blogger

Personal Bloghttps://blog.alexmacra.com/
Cybersecurity Bloghttps://techsplicer.com/
Pentesting a Web Application: A Case Study

Following my previous case study on Windows application security testing, I returned to my area of expertise: web applications. Familiarity doesn’t guarantee ease, particularly when facing deadlines…

TechSplicer Blog
Web App Security Architecture: Implementing Defense-in-Depth

In this article, we are going to explore the defense-in-depth principle applied to web applications. Actually, it can apply to most software. Nowadays, modern software is designed with an internet…

TechSplicer Blog
LLMs are on their way to becoming our greatest security vulnerability

LLMs are currently transforming all fields and are being weaponized by cyber attackers. In a brief span of time, GenAI has left its mark on cybersecurity as well. While gaining traction…

TechSplicer Blog

🧬💸 23andMe bankruptcy sale: Privacy concerns escalating as genetic data hangs in the balance

What happens to your DNA when the company holding it goes under?

🔗 https://alexmacra.com/news/23andme-bankrupcy-sell-privacy-concerns-and-escalating-tensions-surrounding-the-headline/

#23andMe #Privacy

23andMe bankrupcy sell: Privacy concerns and escalating tensions surrounding the headline

23andMe’s bankruptcy is making constant headlines. A while back Regeneron Pharmaceuticals bought genomics firm 23andMe for $256 million, after a court-supervised sale [source]. Despite the company’s…

TechSplicer Blog
Signal is in the news and for the wrong reasons, yet again

“The human is the weakest link in the security chain.” Recent events in Washington have demonstrated this cliche with clarity. This week, we’ve all witnessed yet another high-profile security breach…

TechSplicer Blog

🔍 Just published my latest case study on pentesting a Windows application! Discoveries:

👔 Disabled security flags, that lead to uncovering of many high risk vulnerabilities
🔐 Plaintext credentials
🚪 A backdoor that bypasses authentication

Read more: 🔗 https://techsplicer.com/career-hub/pentesting-a-windows-application-a-case-study/

#dev #cyber #pentest #infosec #windowssecurity

Pentesting a Windows Application: A Case Study

With time, pentesting develops into a somewhat predictable process. Years spent coding web applications now frequently result in web penetration testing assignments for me.

TechSplicer Blog

Mitigation Strategies for Desktop and Web Applications - practical security approaches for developers and architects to protect against common vulnerabilities.

Check it out here: https://techsplicer.com/career-hub/mitigation-strategies-for-desktop-and-web-applications/

#InfoSec #WebSecurity #AppDev #CyberSecurity 🛡️ #tech #dev

Mitigation Strategies for Desktop and Web Applications

Lately, we’ve faced some interesting new challenges. Security layers are being implemented more frequently in the Software Development Lifecycle and this leads to issues that were not present before…

TechSplicer Blog
Cybersecurity 101: Understanding Confidentiality, in the CIA Triad

Continuing with our cybersecurity fundamental series, we’ll explore one essential concept in cybersecurity – the CIA Triad. While the acronym might evoke thoughts of a certain intelligence agency…

TechSplicer Blog

🔐 The Mathematics of Password Security: A Simple Truth

https://techsplicer.com/cybersecurity-guides/the-mathematics-behind-password-strength/

🔑 Tl;dr: Length beats complexity!

#InfoSec #CyberSecurity #PasswordSecurity #dev #Tech

The Mathematics Behind Password Strength

Explore the mathematical principles behind password strength, entropy calculations, and why longer passwords provide better security than complex ones. Includes practical examples and code.

TechSplicer Blog

DORA 2025: Reshaping the financial sector's digital resilience landscape

Key changes ahead for EU financial entities:
🔐 Enhanced ICT risk management
🚨 Incident reporting standards
🤝 Third-party risk oversight
📋 Testing requirements

🔗 https://techsplicer.com/career-hub/dora-2025-the-financial-sectors-new-cyber-reality/

#DORA #tech #Cybersecurity #dev

DORA 2025: The Financial Sector’s New Cyber Reality

The Digital Operational Resilience Act (DORA) will apply as of 17 January 2025, marking another checkpoint in EU’s regulatory landscape. While organizations still struggle to adapt to NIS2…

TechSplicer Blog