Self hosted password vault
github.com·22m·
Discuss: r/selfhosted
🔀SSA Form
Massive Malicious NPM Package Attack Threatens Software Supply Chains
recordedfuture.com·18h
🛡️Parser Security
When ChatGPT Turns Informant
futureofbeinghuman.com·2h·
Discuss: Hacker News
🔄Incremental Parsers
Introducing CodeMender: an AI agent for code security
deepmind.google·5h·
Discuss: Hacker News
🛡️Parser Security
Zero Trust becomes the foundation of cyber security
militaryaerospace.com·1d·
Discuss: Hacker News
🛡️Security Type Systems
AuditKit: Multi-framework compliance scanner that shows what auditors need
auditkit.io·1d·
Discuss: Hacker News
🛡️Security Type Systems
Why traditional secret scanning tools fail to address today's secret management crisis
hashicorp.com·4d
🛡️Security Type Systems
Your Smart Home is Betraying You: How to Secure IoT Devices (Cameras, Speakers, Kettles)
dev.to·1d·
Discuss: DEV
🛡️Security Type Systems
Security leaders at Okta and Zscaler share lessons from Salesloft Drift attacks
cyberscoop.com·8h
🛡️Security Type Systems
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🛡️Capability Security
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.com·5h
🛡️Parser Security
The State of Security Protocols in Agent 2 Agent(A2A) Systems.
dev.to·1d·
Discuss: DEV
🔐Capability Protocols
XWorm malware resurfaces with ransomware module, over 35 plugins
bleepingcomputer.com·3h·
Discuss: r/technews
🛡️Parser Security
Public Key Infrastructure with Secure Shell
free-pmx.org·1d·
Discuss: r/homelab
🔐Capability Protocols
Leak suggests US Government is fibbing over FEMA security failings
theregister.com·8h·
Discuss: Hacker News
🛡️Security Type Systems
When AI Meets Biology: Promise, Risk, and Responsibility
microsoft.com·4h
Effect Inference
Inside PSL: Key Management, Sandboxing, and Secure Enclaves Explained
hackernoon.com·3d
🛡️Security Type Systems
Ask HN: What are common mistakes in Move smart contract development?
news.ycombinator.com·11h·
Discuss: Hacker News
🛡️Error Ergonomics
Secrets Hackers Don’t Tell: Recon Techniques That Actually Pay
infosecwriteups.com·1d
🛡️Taint Analysis