Join us

ContentUpdates from Truffle Security...
Story Trending
@laura_garcia shared a post, 1ย week, 6ย days ago
Software Developer, RELIANOID

๐—จ๐—ž ๐—ฃ๐—ฆ๐—ง๐—œ ๐—”๐—ฐ๐˜: ๐—” ๐—ก๐—ฒ๐˜„ ๐—˜๐—ฟ๐—ฎ ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†

๐Ÿ” ๐—จ๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—จ๐—ž ๐—ฃ๐—ฆ๐—ง๐—œ ๐—”๐—ฐ๐˜: ๐—” ๐—ก๐—ฒ๐˜„ ๐—˜๐—ฟ๐—ฎ ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† The UK is raising the bar on cybersecurity with the Product Security and Telecommunications Infrastructure (PSTI) Act, now in force since April 2024. As cyber threats continue to grow, this regulation introduces a baseline for ..

ย Activity
@vaibhavgupta started using tool WordPress , 1ย week, 6ย days ago.
ย Activity
@vaibhavgupta started using tool Next.js , 1ย week, 6ย days ago.
ย Activity
@vaibhavgupta started using tool All in One SEO Pack , 1ย week, 6ย days ago.
ย Activity
@omarabid added a new tool Code Input , 2ย weeks, 1ย day ago.
ย Activity
@hitechdigital created an organization HitechDigital Solutions , 2ย weeks, 1ย day ago.
Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

Introduction to PostgreSQL Indexes

This post is for developers that have an intuitive knowledge of what database indexes are, but donโ€™t necessarily know how they work internally, what are the tradeoffs associated with indexes, what are the types of indexes provided by postgres and how you can use some of its more advanced options to .. read more ย 

Introduction to PostgreSQL Indexes
Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

How Microsoft Vaporized a Trillion Dollars

A former Azure Core engineer recounts arriving on his first day to find a 122-person org seriously planning to port Windows-based VM management agents - 173 of them, which nobody could fully explain - onto a tiny, low-power ARM chip running Linux. The stack was already failing to scale on server-gra.. read more ย 

How Microsoft Vaporized a Trillion Dollars
Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

Bad Analogies:ย Not Every Money-Burning Company is Amazon

The essay discusses the misconceptions around companies that burn a lot of money, drawing comparisons to Amazon's successful strategy. It delves into examples like Uber and WeWork to highlight the importance of understanding the long-term implications of cash burn. The focus is on the strategies and.. read more ย 

Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

What if I stored data in my mouse

The author experimented with storing data in a Logitech mouse's flash memory. Logitech mice communicate through HID++, a protocol that maps device features using stable IDs. Despite efforts to write data to certain registers, only the DPI register could retain data across power cycles... read more ย 

Truffle Security is the company behind TruffleHog, one of the most widely used open-source tools for discovering leaked secrets in code repositories, cloud environments, and developer infrastructure. The company focuses on securing the modern software supply chain by detecting exposed credentials early, validating them with high accuracy, and providing actionable remediation workflows.

Their platform supports large-scale scanning across GitHub, GitLab, Bitbucket, CI/CD systems, and enterprise codebases, with specialized products for continuous monitoring and automated alerting. Truffle Security works closely with security researchers and enterprises to reduce the risk of account takeovers, data breaches, and supply chain attacks driven by credential leakage. The company also invests in security research programs that uncover real-world vulnerabilities across open-source ecosystems.