1. A Prime on Public Key Infrastructure
    • This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet.

  2. The Software Supply Chain
    • Hardening the software supply chain is a critical challenge for modern software companies.

  3. The Zip Slip Vulnerability Exploitation
    • The Zip Slip vulnerability is exploited using a specially crafted archive that holds directory traversal filenames. I prepared and exploit and explain how it works.