Evading AV and EDR solutions
🔐Security Types
Flag this post
EY 4TB Data Leak
🛡️Taint Analysis
Flag this post
5 things I do to protect my home lab from potentially malicious services
xda-developers.com·7h
🛡️Capability VMs
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·20h
🔗Hash Functions
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·7h
🛡️Parser Security
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐Network Protocols
Flag this post
The Death of the Security Checkbox: BAS Is the Power Behind Real Defense
thehackernews.com·1d
🛡️Capability Security
Flag this post
Keys to the Kingdom: A Defender’s Guide to Privileged Account Monitoring
gixtools.net·2d
🛡️Capability Security
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·17h
🤝Session Protocols
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🛡️Parser Security
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·23h
🔗Hash Functions
Flag this post
The Great Firewall Part 1: The Dump
🔐Security Types
Flag this post
Generative and Predictive AI in Application Security: A Comprehensive Guide
🎭Program Synthesis
Flag this post
De Bruijn Numerals
λLambda Calculus
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
🔗Go Generics
Flag this post
Bitkey's chaincode delegation BIP is pretty cool!
stacker.news·11h
🔒Rust Borrowing
Flag this post
Loading...Loading more...