A Security Model for Systemd
lwn.netยท8hยท
๐Ÿ’ŽBEAM VM
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.netยท23h
๐Ÿ’งElixir
Flag this post
How to avoid the most common threats that compromise Windows
howtogeek.comยท35m
๐Ÿ’ปNeovim
Flag this post
Google Probes Weeks-Long Security Breach Linked to Contractor Access
blogger.comยท1h
๐Ÿ”ŒLSP
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.orgยท57mยท
Discuss: Hacker News
๐ŸŽญActor Model
Flag this post
On the first day my startup website went live, the server was hacked...
dev.toยท15hยท
Discuss: DEV
๐Ÿ”ŒLSP
Flag this post
InfoSec News Nuggets 11/06/2025
aboutdfir.comยท7h
๐Ÿ”ŒLSP
Flag this post
Keeper Security's Industry-First Forcefieldโ„ข Protects Against Memory-Based Attacks on Windows Endpoints
prnewswire.comยท5h
๐Ÿ”ŒLSP
Flag this post
Why Bcrypt Can Be Unsafe for Password Hashing?
blog.enamya.meยท19hยท
Discuss: Hacker News
๐Ÿ’ŽBEAM VM
Flag this post
Have I Been Pwned adds a billion new passwords to its database
ghacks.netยท1h
๐Ÿ’ŽBEAM VM
Flag this post
urbanadventurer/Android-PIN-Bruteforce
github.comยท15h
๐Ÿ”ŒLSP
Flag this post
The best new feature in Windows 11 isnโ€™t Copilot
makeuseof.comยท36m
๐Ÿ”ŒLSP
Flag this post
You'll never guess what the most common passwords are. Oh, wait, yes you will
theregister.comยท3h
๐Ÿ”ŒLSP
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1d
๐Ÿ’ŽBEAM VM
Flag this post
How to Secure Your Android Device When Youโ€™re a Busy Student
androidheadlines.comยท1d
๐ŸŽญActor Model
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.eduยท15h
๐Ÿ”ŒLSP
Flag this post
Protected: Making search smarter with system-generated search pipelines
opensearch.orgยท16m
๐Ÿ”ŒLSP
Flag this post
Trusting AI Output? Why Improper Output Handling is the New XSS
auth0.comยท17h
๐Ÿ”ŒLSP
Flag this post
Anti-hacker USB-C cables are just snake oil, here's all you have to do instead
xda-developers.comยท6h
๐Ÿ’งElixir
Flag this post
Unauthorized access to Dell CloudLink and Command Monitor possible
heise.deยท7h
๐Ÿ’ŽBEAM VM
Flag this post