ELA-1567-1 unbound security update
freexian.comยท1d
๐Hacking
Flag this post
Rockbox for Innioasis Y1; or, a ramble on installing stuff
joelchrono.xyzยท20h
๐งLinux
Flag this post
AIxCC 2025: What It Means For Device Security
semiengineering.comยท2d
๐๏ธSoftware Architecture
Flag this post
New BIP-444: Reduce Data Temporary Soft Fork Proposal
github.comยท12h
๐งReverse Engineering
Flag this post
Refactoring English: Month 11
mtlynch.ioยท1d
๐งReverse Engineering
Flag this post
Codeminer42 Dev Weekly #86
blog.codeminer42.comยท1d
๐๏ธSoftware Architecture
Flag this post
BlocksDS Nintendo DS(I) devkit now supports WPA2 networks in homebrew software
๐๏ธSoftware Architecture
Flag this post
12 steps you can take right now to be safer online
engadget.comยท1h
๐Hacking
Flag this post
Satisfying Bazel'ยยs relative paths requirement in C++ toolchains
๐งReverse Engineering
Flag this post
Base64 Encoder โ Wrap Your Data in a Cozy Little Blanket ๐ต๏ธโโ๏ธ๐งฃ
๐Hacking
Flag this post
<p>**Abstract:** This paper proposes a novel framework, CodeRefactorAI, for automated code refactoring and quality enhancement within large-scale microservice a...
freederia.comยท1d
๐๏ธSoftware Architecture
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.comยท21h
๐Hacking
Flag this post
Cybercrims plant destructive time bomb malware in industrial .NET extensions
theregister.comยท22h
๐Hacking
Flag this post
IncusOS โ A Platform for Modern Virtualization & Containerization Infrastructure
gyptazy.comยท1d
๐งLinux
Flag this post
HTB: Dump
0xdf.gitlab.ioยท4d
๐Hacking
Flag this post
Consistent Hashing: The Unseen Engine
๐Hacking
Flag this post
Loading...Loading more...