Endigest logo
Endigest
All Tech BlogsExplore TagsSend Feedback
Newsletter
Endigest logo
Endigest

© 2026 Endigest. All rights reserved.

  • About
  • Privacy
  • Terms
  • Contact
  • RSS

Security Articles

Explore real-world engineering experiences from top tech companies.

필터 초기화
⌘K
AllFrontendBackendAI / MLML OpsDevOpsMobileArchitectureData EngSecurityProductCulture

Trending This Week

#1
GitHub logoGitHub

Agent-driven development in Copilot Applied Science

13 views2026-03-31
#2
AWS logoAWS

Announcing managed daemon support for Amazon ECS Managed Instances

12 views2026-04-01
#3
Google Cloud logoGoogle Cloud

Spanner's multi-model advantage for the era of agentic AI

10 views2026-03-31
#4
AWS logoAWS

AWS Weekly Roundup: AWS DevOps Agent & Security Agent GA, Product Lifecycle updates, and more (April 6, 2026)

9 views2026-04-06
#5
The Hacker News logoThe Hacker News

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

9 views2026-03-31
#6
Google Cloud logoGoogle Cloud

How AI-powered tools are driving the next wave of sustainable infrastructure and reporting

9 views2026-03-31

Get the latest tech trends every morning

Receive daily AI-curated summaries of engineering articles from top tech companies worldwide.

  • 1
  • More pages
  • 24
  • 25
  • 26
GitHub logoGitHub
35 min read
Security•2026-01-15

When protections outlive their purpose: A lesson on managing defense systems at scale

GitHub shares a post-incident analysis on how emergency rate-limiting protections outlived their purpose and began incorrectly blocking legitimate users.

Cloudflare logoCloudflare
01 min read
Security•2026-01-13

What we know about Iran’s Internet shutdown

This post documents Iran's Internet shutdown in early January 2026, observed through Cloudflare Radar data amid widespread protests.

Internet Shutdown
Radar
Internet Traffic
1.1.1.1
Supabase logoSupabase
21 min read
Security•2026-01-07

Supabase Security Retro: 2025

This post reviews Supabase platform security changes made throughout 2025 and outlines the security defaults planned for 2026.

Cloudflare logoCloudflare
11 min read
Security•2026-01-06

A closer look at a BGP anomaly in Venezuela

This post analyzes a BGP route leak involving Venezuela's state-run ISP CANTV (AS8048), arguing the anomaly was likely due to poor routing policy rather than malicious intent.

BGP
RPKI
Routing
Routing Security
Network Services
Cloudflare logoCloudflare
01 min read
Security•2025-12-19

Innovating to address streaming abuse — and our latest transparency report

Cloudflare's latest transparency report (H1 2025) highlights its evolving approach to combating streaming abuse and copyright infringement.

Transparency
Slack logoSlack
21 min read
Security•2025-12-01

Streamlining Security Investigations with Agents

Slack's Security Engineering team built an AI agent system to automate and improve security alert investigations at scale.

Uncategorized
development
security
software-engineering
Grab logoGrab
07 min read
Security•2025-12-01

A Decade of Defense: Celebrating Grab's 10th Year Bug Bounty Program

Grab celebrates the 10th anniversary of its bug bounty program in partnership with HackerOne, reflecting on a decade of collaborative security research.

engineering
performance
Engineering
Data
GitHub logoGitHub
14 min read
Security•2025-09-15

Post-quantum security for SSH access on GitHub

GitHub is adding a post-quantum secure SSH key exchange algorithm to protect Git data access against future quantum computing threats.

Slack logoSlack
51 min read
Security•2025-09-04

Building Slack’s Anomaly Event Response

This post introduces Slack's Anomaly Event Response (AER), a proactive security system that automatically terminates user sessions upon detecting suspicious behavior.

Uncategorized
incident-response
security
Squareup logoSquareup
31 min read
Security•2025-06-25

Hijacking Amazon EventBridge for launching Cross-Account attacks

This article explores how AWS EventBridge cross-account configurations can be exploited for infiltration, exfiltration, and persistent attacks.

Engineering
Slack logoSlack
11 min read
Security•2025-03-07

How we built enterprise search to be secure and private

Slack's enterprise search architecture prioritizes security and privacy when integrating external data sources like Google Drive and GitHub into Slack search.

Uncategorized
Squareup logoSquareup
11 min read
Security•2025-01-28

Kube-Policies: Guardrails for Apps Running in Kubernetes

This post describes how a Compute Security team built kube-policies, a custom Kubernetes admission controller on top of Open Policy Agent (OPA) to replace Pod Security Policies with adaptive security guardrails.

Engineering