How to handle secrets on the command line
smallstep.com·1h·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
How a Crypto Recovery Expert Can Help You Recover Lost Funds: Visit Techy Force Cyber Retrieval
dev.to·8h·
Discuss: DEV
🤖AI
Flag this post
A self-hosted Security Operations Center in a box to avoid vendor lock
github.com·13h·
🕵Threat intelligence
Flag this post
The Privacy Manifesto
zac1258019.substack.com·2h·
Discuss: Substack
🕵Threat intelligence
Flag this post
Zero Click: The Hack You Never See Coming
future.forem.com·16h·
Discuss: DEV
🕵Threat intelligence
Flag this post
Great, now even malware is using LLMs to rewrite its code, says Google, as it documents new phase of 'AI abuse'
pcgamer.com·1d·
Discuss: r/technews
🤖AI
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.io·1d·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
Understanding the Digital Underworld That Puts Your Data at Risk
dev.to·1d·
Discuss: DEV
🕵Threat intelligence
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.org·1d·
Discuss: Hacker News
🤖AI
Flag this post
Ray Security – Predictive Data Security Platform
raysecurity.io·1d·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
Most DevSecOps Advice Is Useless without Context—Here’s What Actually Works
docker.com·9h
🕵Threat intelligence
Flag this post
A leadership vacuum and staff cuts threaten NSA morale, operational strength
nextgov.com·3d·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
Telecom industry embraces “collective defence” model to counter rising cyber threats
dev.to·1d·
Discuss: DEV
🕵Threat intelligence
Flag this post
About kgateway vulnerabilities
reddit.com·1d·
Discuss: r/kubernetes
🕵Threat intelligence
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·2d
🕵Threat intelligence
Flag this post
You'll never guess what the most common passwords are. Oh, wait, yes you will
theregister.com·1d·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
Workload Identity in a Multi System Environment (Wimse) Architecture
datatracker.ietf.org·1d·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
Americans Are Increasingly Alone, but Are They Lonely?
realclearinvestigations.com·2h·
Discuss: Hacker News
🕵Threat intelligence
Flag this post
Training Junior Engineers
natashajaffe.substack.com·11h·
Discuss: Substack
🕵Threat intelligence
Flag this post
CyberGhost DMCAs Our Story About Their Bogus DMCA (Yes, Really)
techdirt.com·4h·
Discuss: Hacker News
🕵Threat intelligence
Flag this post