CyberDesserts
  • Feedly
  • Home
  • Blog
  • About
Sign in Subscribe

Latest

Poisoned Packages: Auditing the NPM Supply Chain

Poisoned Packages: Auditing the NPM Supply Chain

Navigating the rise of self-replicating worms and credential theft in the open-source world

By Shak 18 Sep 2025
Getting Started With Docker: For Cybersecurity Tools

Getting Started With Docker: For Cybersecurity Tools

Using Docker For Cybersecurity Projects. This tutorial will take you from complete beginner to confidently running and building Docker containers.

By Shak 10 Sep 2025
What Are Infostealers: And Who Are The Players

What Are Infostealers: And Who Are The Players

Summary Infostealers are no longer small-time annoyances. They’ve evolved into a multi-billion-dollar criminal ecosystem powering ransomware, fraud, and espionage. In 2024, 2.1 billion credentials were stolen globally. Phishing campaigns are up 84%, and macOS users are now firmly in the crosshairs. It should be a top priority for

By Shak 03 Aug 2025
See all
CyberDesserts
  • Sign up
Powered by Ghost

CyberDesserts

Learn Cybersecurity By Doing

© 2025 CyberDesserts. All rights reserved.
RSS Blog About Privacy Policy Terms of Service GitHub