Chinese Hackers Attack Prominent U.S Organizations
blogger.comยท17h
๐Ÿ–ฅSelfhosting
Flag this post
Best infosec-related long reads for the week of 11/1/25
metacurity.comยท1d
๐Ÿ‘จProgramming
Flag this post
I logged all the HTTP requests that hit my new web server
lenny.bearblog.devยท21h
๐Ÿ–ฅSelfhosting
Flag this post
Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack
techdirt.comยท2d
๐Ÿ–ฅSelfhosting
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.comยท2d
๐Ÿ–ฅSelfhosting
Flag this post
Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
arxiv.orgยท3d
๐Ÿ‘จProgramming
Flag this post
Condensation
lesswrong.comยท2h
๐Ÿ‘จProgramming
Flag this post
Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)
dev.toยท10hยท
Discuss: DEV
๐Ÿ‘จProgramming
Flag this post
Server-Side Includes (SSI) Injection: The 90s Attack That Still Works ๐Ÿ•ฐ๏ธ
instatunnel.myยท6hยท
Discuss: r/devops
๐Ÿ–ฅSelfhosting
Flag this post
Securing critical infrastructure: Why Europeโ€™s risk-based regulations matter
microsoft.comยท4d
๐Ÿ–ฅSelfhosting
Flag this post
The unbearable lightness of getting scammed: Future of full scale cybersecurity
techradar.comยท2d
๐Ÿ–ฅSelfhosting
Flag this post
State-Sponsored Remote Wipe Tactics Targeting Android Devices
genians.co.krยท7hยท
Discuss: Hacker News
๐Ÿ–ฅSelfhosting
Flag this post
Google Chrome to Show Stronger Warnings for Insecure HTTP Sites Starting October 2025
blogger.comยท6h
๐Ÿ–ฅSelfhosting
Flag this post
Pentagon releases โ€˜revisedโ€™ plan to boost cyber talent, โ€˜domain masteryโ€™
breakingdefense.comยท2d
๐Ÿ‘จProgramming
Flag this post
AWS SAA to Security Clearance: My Path to Federal Cloud Engineering
linkedin.comยท10hยท
Discuss: DEV
๐Ÿ–ฅSelfhosting
Flag this post
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
blogger.comยท14h
๐Ÿ–ฅSelfhosting
Flag this post
Sweden Confirms Power Grid Breach Amid Growing Ransomware Concerns
blogger.comยท1d
๐Ÿ–ฅSelfhosting
Flag this post
The quiet revolution: How regulation is forcing cybersecurity accountability
cyberscoop.comยท2d
๐Ÿ‘จProgramming
Flag this post
Nearly half of topk websites have no password length requirements
scworld.comยท3hยท
Discuss: Hacker News
๐Ÿ–ฅSelfhosting
Flag this post
A diffusion-based multi-modal anomaly detection approach for data communication in TACS
sciencedirect.comยท22h
๐Ÿ‘จProgramming
Flag this post