One of my teams at Google, ๐๐ ๐๐ด๐ฒ๐ป๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐, is expanding in ๐ญ๐๐ฟ๐ถ๐ฐ๐ต ๐จ๐ญand ๐ก๐ฒ๐ ๐ฌ๐ผ๐ฟ๐ธ ๐บ๐ธ. We're looking for ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ป๐ด๐ถ๐ป๐ฒ๐ฒ๐ฟ๐ with experience in attacking and securing AI/ML systems. DMs open.
09.04.2025 18:45 โ ๐ 3 ๐ 3 ๐ฌ 1 ๐ 0
Security Signals: Making Web Security Posture Measurable At Scale
Excited to present Security Signals with @ddworken.bsky.social and @webappsec.dev, my primary project at Google for the past five years. Thanks, @madwebwork.bsky.social!
Paper: research.google/pubs/securit...
Slides: speakerdeck.com/mikispag/sec...
01.03.2025 07:51 โ ๐ 10 ๐ 4 ๐ฌ 0 ๐ 1
Blog: Secure by Design: Google's Blueprint for a High-Assurance Web Framework
Learn more about how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities.
Building secure web apps shouldn't be a burden. We've built a high-assurance web framework at Google that makes security easy for developers. Learn about our "Secure by Design" approach and how it works in our new blog post:
bughunters.google.com/blog/6644316...
cc: @ddworken.bsky.social
04.02.2025 09:57 โ ๐ 16 ๐ 5 ๐ฌ 0 ๐ 1
Thank you!
04.02.2025 10:38 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Blog: Secure by Design: Google's Blueprint for a High-Assurance Web Framework
Learn more about how Google has created and deployed a high-assurance web framework that almost completely eliminates exploitable web vulnerabilities.
Building secure web apps shouldn't be a burden. We've built a high-assurance web framework at Google that makes security easy for developers. Learn about our "Secure by Design" approach and how it works in our new blog post:
bughunters.google.com/blog/6644316...
cc: @ddworken.bsky.social
04.02.2025 09:57 โ ๐ 16 ๐ 5 ๐ฌ 0 ๐ 1
Deserved!
26.01.2025 18:19 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0
Added! ๐
04.12.2024 22:36 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Blog: Externalizing the Google Domain Tiers Concept
Do you want to know more about the concept of domain tiers, understand how they are applied at Google, and view a list of Google's highest sensitivity domains? Take a look at this blog post to find ou...
I haven't looked into MITRE's methodology, but at Google we're using "domain tiers": bughunters.google.com/blog/4562175...
On TIER0 domains a critical vulnerability (e.g. XSS or authorization bypass) could lead to a full compromise of a user's account or execution of code on their or a cloud system.
02.12.2024 23:28 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Modern solutions against cross-site attacks
Modern solutions against cross-site attacks
Modern solutions against cross-site attacks (frederikbraun.de/modern-solut...): An article about cross-site leak attacks and browser-based defenses. You will also learn why web security best practices is always opt-in and finally how YOU can get increased security controls.
27.11.2024 07:50 โ ๐ 34 ๐ 19 ๐ฌ 0 ๐ 1
Welcome @shhnjk.bsky.social ๐
26.11.2024 21:26 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Thank you ๐
26.11.2024 21:24 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
This is my #IT, #Infosec, and #Cybersecurity starter pack.
Thereโs plenty of room if some people want to be added too. But here are some feeds and people I recommend following
go.bsky.app/QYMa3yN
26.11.2024 21:19 โ ๐ 19 ๐ 4 ๐ฌ 4 ๐ 0
If you still have a spot, I'd love to get added. I write about web security, web platform security features and safe by design principles
26.11.2024 21:22 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
These are all good points. One way to get good visibility into XSS issues on sensitive services is via bug bounty programs.
At least this worked very well for us.
Also CSP was a part of our approach of mitigating XSS at scale. See page 7: static.googleusercontent.com/media/public...
26.11.2024 21:13 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Yes, this works (and imho the only approach that works at scale). See page 7 of Google's secure by design whitepaper: static.googleusercontent.com/media/public...
26.11.2024 21:10 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Unfortunately, the only way to make this work right now is by adding 'strict-dynamic' to your CSP. This an issue that comes up frequently, but we haven't so far been able to come up with an elegant way to this address this in the web platform.
cc: @mikewe.st @arturjanc.bsky.social
26.11.2024 18:40 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Sure, added! Please add me to your Swiss Cyber Security package as well, I've been in CH since more than 10 years now =)
bsky.app/starter-pack...
25.11.2024 14:22 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Must have been quite a journey! Congrats!
24.11.2024 19:52 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Of course! Added! So great that you're here too
24.11.2024 19:38 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Mamma mia!
23.11.2024 19:39 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0
facebook error
netflix error
okta error
whatsapp error
Handling Cookies is a Minefield:
Inconsistencies in the HTTP cookie specification and its implementations have caused a situation where countless websites (including Facebook, Netflix, Okta, WhatsApp, Apple, etc.) are one small mistake away from locking their users out.
grayduck.mn/2024/11/21/h...
21.11.2024 17:11 โ ๐ 169 ๐ 54 ๐ฌ 13 ๐ 8
Congratulations, this is amazing!
Since you asked, our Google CSP/Reporting API collector currently processes ~3.5B reports per day. That's for CSP, COOP, Trusted Types, and custom reporting.
It has enabled us to truly scale up deployment of web platform security features across Google in a safe way
22.11.2024 15:14 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
โ web security & web platform security features nerd and in a hate/love relationship with CSP (it's complicated)
21.11.2024 21:47 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Check out @j-opdenakker.bsky.social starter pack too: go.bsky.app/HDnVb6K
21.11.2024 08:29 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
absolutely! Added =)
21.11.2024 07:49 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Welcome Eduardo ๐ฅณ
Added you to the starter pack
21.11.2024 07:47 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Success is not final; failure is not fatal: it is the courage to continue that counts.
https://darknetdiaries.com/
๐That Hacker guy with a BMW (E46)
๐Application Security Engineer @TeamIrembo
๐ 2018 @Cyberstarspro Winner
๐ Security Research | Generative AI
๐ง๐ฎ๐ท๐ผ
Co-Founder @shielder.com
CTF Player jbz.team
Cliff Jumping Lover (23mt max so far)
Private account! Red teamer @codewhitesec. @frycos@infosec.exchange @frycos@X
Freelance Professional Pentester
hacker, founder Hacksclusive
Lead developer | Bug hunter (approximately every 3 months)
> https://aeth.cc
Security Researcher | Blog writer | Hacker | DEFCON speaker | Gamer | Silly stuff lover.
https://taltechtreks.com/
Principal Security Researcher @MSFT
Opinions are my own and do not reflect on my employer.
Bugbounty hunter| Rust dev| The man of mankind | Application Security Engineer . OSCP in view , #Bitcoin-core contributor
I help builders and breakers of code learn to find security vulnerabilities in their apps and APIs.
๐ Join 10K appsec hackers @ https://apihacker.blog/subscribe
Hacking stuff at https://www.redguard.ch/
https://seanpesce.blogspot.com
Your Friendly Cloud Antagonist
Proficient at drawing the rest of the ๐ฆ