How to protect your home from burglary
the-independent.com·1h
🛡️Capability Security
Weird Operators in PHP
exakat.io·1h·
Discuss: Hacker News
🏷️Symbol Mangling
reply in age verification insanity log by the-syreth-clan
basementcommunity.com·1h
🏷️Memory Tagging
Red Hat Confirms GitLab Instance Hack, Data Theft
securityweek.com·17h·
Discuss: Hacker News
🛡️Taint Analysis
Privacy Protection: Encrypted DNS
rajhackingarticles.blogspot.com·4d·
🛡️Security Type Systems
Working for a Vendor with David Gee
blog.ipspace.net·2h
📚Self-Documenting Code
SDQ-LLM: Sigma-Delta Quantization for 1-bit LLMs of any size
reddit.com·5h·
Discuss: r/LocalLLaMA
📏Linear Memory
Safe and Compliant Cross-Market Trade Execution via Constrained RL and Zero-Knowledge Audits
arxiv.org·4h
📮Message Queues
Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
isc.sans.edu·1d
🛡️Parser Security
PSA: Think Twice Before Using Custom Windows Versions like Ghost Spectre - I Found a Sophisticated Backdoor
collectiveinclusive.notion.site·4d·
Discuss: r/Windows11
🛡️Security Type Systems
New Data Exfiltration Technique Using Brave Sync
infosecwriteups.com·1d
🌐Browser REPLs
Information Extraction (Tests on a Beta API) from Docling
dev.to·17h·
Discuss: DEV
💬Interactive REPLs
Feeling Invisible Online? Dive into the World of Decentralized Identity!
dev.to·1d·
Discuss: DEV
🛡️Security Type Systems
Fire destroys S. Korean government's cloud storage system, no backups available
dev.to·1d·
Discuss: DEV
📁File Systems
#DAY 12: My Project Summary & Learning Journey.
dev.to·1d·
Discuss: DEV
🛡️Capability VMs
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
cloud.google.com·6d
🛡️Capability Security