“On Being Watched from Above,” by Carolyn Forché
newyorker.com·23h
🔐Cryptography
Flag this post
StrengthX
🔐Cryptography
Flag this post
A systems-theoretic approach for identifying security vulnerabilities in machine learning-enhanced industrial control systems
sciencedirect.com·2d
🔌Embedded Systems
Flag this post
Password manager KeePass 2.60 is now available: here is what is new
ghacks.net·23h
🌐Network Security
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
🛡️Cybersecurity
Flag this post
How to Make Zoom Meetings More Secure and Protect Your Privacy
blogger.com·2d
🌐Network Security
Flag this post
3rd November – Threat Intelligence Report
research.checkpoint.com·1d
🌐Network Security
Flag this post
RP2350 hacking challenge 2: into extra time
raspberrypi.com·1d
🔐Cryptography
Flag this post
New Vidar Variant Uses API Hooking to Steal Data Before Encryption
blogger.com·1d
🌐Network Security
Flag this post
HTB: Store
0xdf.gitlab.io·5d
🐧Linux
Flag this post
Guide: TLS and QUIC
🔐Cryptography
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.com·4d
🔐Cryptography
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.com·1d
🌐Network Security
Flag this post
Readable Code Is Unreadable
🔧Assembly Language
Flag this post
FreakWAN: A floor-routing WAN implementing a chat over bare-LoRa (no LoRaWAN)
🌐Network Security
Flag this post
SANDEVISTAN TOOLKIT
🛡️Cybersecurity
Flag this post
5 things I do to protect my home lab from potentially malicious services
xda-developers.com·3d
🐧Linux
Flag this post
Loading...Loading more...