Concept-Based Generic Programming -- Bjarne Stroustrup
isocpp.org·12h
🗂️Type Indexing
Flag this post
Making SLH-DSA 10x-100x Faster
conduition.io·9h
🔗Hash Algorithms
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.com·1d
🛡️Security Type Systems
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🛡️Parser Security
Flag this post
Your organization’s top 4 data protection best practices
proton.me·3d
🛡️Security Type Systems
Flag this post
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
thehackernews.com·1d
🛡️Parser Security
Flag this post
Fair Screen – Detect Cluely/Interview Coder Kind of Interview Cheating Tools
fairscreen.co·8h·
Discuss: Hacker News
🔐Capability Protocols
Flag this post
Minimal CLI web security scanner
github.com·19h·
Discuss: Hacker News
🛡️Parser Security
Flag this post
Sanctions on Russia-based cybercrime hosts mark a new phase in Western crackdowns
weeklyblitz.net·1d
🛡️Security Type Systems
Flag this post
A $5 Domain Purchase Exposed Critical AI Agent Security Flaws – Deep Dive
pylar.ai·1d·
Discuss: Hacker News
🛡️Parser Security
Flag this post
Why GRC Programs Fail Without Continuous Cyber Risk Intelligence
securityscorecard.com·1d
🛡️Security Type Systems
Flag this post
on extracting wechat database encryption keys (macos edition)
mgx.bearblog.dev·12h
🏷️Memory Tagging
Flag this post
Secure your APIs at the edge with Datadog App and API Protection
datadoghq.com·2d
🛡️Security Type Systems
Flag this post
Weekly Bookmarks
inkdroid.org·4h
🪢Rope Data Structures
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.com·18h
🛡️Security Type Systems
Flag this post
IP-Tools 5.8.7
majorgeeks.com·12h
🌍Minimal HTTP
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·14h·
Discuss: Hacker News
Type Checking
Flag this post
What Is a Firewall—and Why Should You Use One?
zeroday.forem.com·3d·
Discuss: DEV
🛡️Security Type Systems
Flag this post
Hacker Review of Ghost in the Shell (1995)
hackerfiction.net·17h·
Discuss: Hacker News
🛡️Security Type Systems
Flag this post
How much cyber security do I need in 2025?
mashable.com·4d
🔗Hash Functions
Flag this post