The Sacrilegious Coder
medium.comยท11hยท
Discuss: DEV
๐Ÿ“šSelf-Documenting Code
Flag this post
How much cyber security do I need in 2025?
mashable.comยท4d
๐Ÿ”—Hash Functions
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.comยท3d
๐Ÿ›ก๏ธParser Security
Flag this post
Hack a Windows System Using PowerShell
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ปTerminal Control
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.comยท12hยท
๐Ÿท๏ธMemory Tagging
Flag this post
The privacy nightmare of browser fingerprinting
kevinboone.meยท20hยท
Discuss: Hacker News
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
Python Certifi and Custom CAs
zufallsheld.deยท18hยท
Discuss: Hacker News
โœ…Configuration Validation
Flag this post
Industries Where Your C Code Saves Lives (And They're Hiring)
dev.toยท6hยท
Discuss: DEV
๐Ÿ”ŒMicrocontrollers
Flag this post
Securing the Win: What Cybersecurity Can Learn From the Paddock
darkreading.comยท2d
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
Built Bittorrent in go
github.comยท22hยท
Discuss: r/golang
๐Ÿ•ธ๏ธP2P Protocols
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท21h
๐Ÿ”’Rust Borrowing
Flag this post
What is masked email? This new spin on an old practice supercharges security
nordot.appยท1d
๐Ÿ›ก๏ธParser Security
Flag this post
Automated Regulatory Compliance Risk Assessment via Multi-Modal Knowledge Graph Fusion & Explainable AI
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠDataFrame Types
Flag this post
The Limits of Formal Security Models โ€“ Dorothy E. Denning (1999)
faculty.nps.eduยท3dยท
Discuss: Hacker News
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
Back to security basics: phishing
jamf.comยท2d
๐Ÿ”—Hash Functions
Flag this post
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
cloud.google.comยท2d
๐Ÿ›ก๏ธParser Security
Flag this post
Understanding X's "About this Account" Feature: A Fact-Based Overview
kiledjian.comยท8h
๐Ÿท๏ธMemory Tagging
Flag this post
OWASP Top 10 tackles supply chain risk
reversinglabs.comยท2d
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
How SaaS companies can achieve ISO 27001 certification and demonstrate a strong security posture
krdo.comยท2d
โœ…Configuration Validation
Flag this post
WhatsApp API flaw let researchers scrape 3.5B accounts
bleepingcomputer.comยท15hยท
๐Ÿ›ก๏ธParser Security
Flag this post