Alcove: An RSS Reader for the Open Web
bearblog.stevedylan.devยท4h
๐Ÿ indieweb
Flag this post
EP190: Cloudflare vs. AWS vs. Azure
blog.bytebytego.comยท15h
๐ŸŒMinimal HTTP
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท15h
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
FCC rolls back cybersecurity rules for telcos despite state hacking risks
bleepingcomputer.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท2d
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐Ÿท๏ธMemory Tagging
Flag this post
A Comprehensive Guide to Auth0 Security Against Identity Attacks
auth0.comยท2d
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
GuardScan: Building a Privacy-First SAST Tool with Multi-Language AST Parsing
reddit.comยท2dยท
Discuss: r/programming
โš™๏ธTOML Parsers
Flag this post
Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025
bitsight.comยท2d
๐Ÿ›ก๏ธParser Security
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Ÿ”—Hash Functions
Flag this post
Three security invariants could prevent 65% of preaches
blog.apnic.netยท3d
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movยท11hยท
Discuss: Hacker News
๐Ÿท๏ธMemory Tagging
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.comยท13hยท
Discuss: Hacker News
๐Ÿ›ก๏ธParser Security
Flag this post
Beyond the Changelog: Engineering Your Blog for B2B Thought Leadership
getmichaelai.comยท20hยท
Discuss: DEV
๐ŸŽฎLanguage Ergonomics
Flag this post
Data Exfiltration in Claude for Excel
promptarmor.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธParser Security
Flag this post
Legal Restrictions on Vulnerability Disclosure
schneier.comยท3dยท
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
Cloak of Invisibility: Hiding from AI in Plain Sight
dev.toยท9hยท
Discuss: DEV
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
Making SLH-DSA 10x-100x Faster
conduition.ioยท8h
๐Ÿ”—Hash Algorithms
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.comยท1d
๐Ÿ›ก๏ธParser Security
Flag this post