Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: resource Clear Filter

Show HN: Pangolin – Open source alternative to Cloudflare Tunnels

Tunneled Reverse Proxy Server with Access Control Your own self-hosted zero trust tunnel. Pangolin is a self-hosted tunneled reverse proxy server with identity and access control, designed to securely expose private resources on distributed networks. Acting as a central hub, it connects isolated networks — even those behind restrictive firewalls — through encrypted tunnels, enabling easy access to remote services without opening ports. Resources page of Pangolin dashboard (dark mode) showing

Most RESTful APIs aren't really RESTful

When talking about REST, it is worth reading the dissertation of Roy Thomas Fielding. The original paper that describes RESTful web, “Architectural Styles and the Design of Network-based Software Architectures” Roy T. Fielding (2000), introduces the Representational State Transfer (REST) architectural style as a framework for designing scalable, performant, and maintainable networked systems, particularly web services. The paper aims to analyze architectural styles for network-based systems, id

Most RESTful APIs Aren't RESTful

When talking about REST, it is worth reading the dissertation of Roy Thomas Fielding. The original paper that describes RESTful web, “Architectural Styles and the Design of Network-based Software Architectures” Roy T. Fielding (2000), introduces the Representational State Transfer (REST) architectural style as a framework for designing scalable, performant, and maintainable networked systems, particularly web services. The paper aims to analyze architectural styles for network-based systems, id

Poor Man's Back End-as-a-Service (BaaS), Similar to Firebase/Supabase/Pocketbase

Pennybase Poor man's Backend-as-a-Service (BaaS), similar to Firebase/Supabase/Pocketbase It implements core backend features in less than 1000 lines of Go code, using only standard library and no external dependencies: File-based storage using CSV with versioned records using CSV with versioned records REST API with JSON responses with JSON responses Authentication with session cookies and Basic Auth with session cookies and Basic Auth RBAC & ownership-based permissions Real-time updates

Azure API vulnerability and roles misconfiguration compromise corporate networks

TL;DR Token Security researchers have discovered several Azure built-in roles that are misconfigured to be over-privileged - they grant more permissions than intended by Azure. In addition, we discovered another vulnerability in the Azure API that allows attackers to leak VPN keys. Combined, these two issues create a new attack chain that lets a weak user gain access to both internal cloud assets and on-premises networks. In this report, we detail the research process that led to the discove