A Deep Dive into the Morris Worm
rapid7.comยท3hยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
eprint.iacr.orgยท2d
๐Ÿ”Zero-Knowledge Proofs
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.aiยท1dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
We Tested 6 AI Models on 3 Common Security Exploits
blog.kilocode.aiยท10hยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.ioยท23hยท
๐Ÿ“กSide-Channel Attacks
Flag this post
A Security Model for Systemd
lwn.netยท33mยท
๐Ÿ“กSide-Channel Attacks
Flag this post
Famed software engineer DJB tries Fil-C and likes what he sees
theregister.comยท22hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Show HN: Kumi โ€“ a portable, declarative, functional core for business logic
kumi-play-web.fly.devยท13hยท
Discuss: Hacker News
โœ…Formal Methods
Flag this post
AI Slop vs. OSS Security
devansh.bearblog.devยท1dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
github.comยท2dยท
๐Ÿฆ€Rust
Flag this post
Breaking and Fixing MacaKey
eprint.iacr.orgยท2d
๐Ÿ”’Cryptography
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
cloud.google.comยท19hยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Dive into Systems
diveintosystems.orgยท2dยท
Discuss: Hacker News
โœ…Formal Methods
Flag this post
Firefox and Chromium
madaidans-insecurities.github.ioยท4hยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Low-Level Hacks
blog.raycursive.comยท2dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Flatpak Happenings
blog.sebastianwick.netยท21hยท
๐Ÿ“กSide-Channel Attacks
Flag this post
Randomness Testing Guide
random.tastemaker.designยท2dยท
Discuss: Hacker News
๐Ÿ”’Cryptography
Flag this post
Critical UniFi OS Flaw Enables Remote Code Execution
gbhackers.comยท1dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.auยท21hยท
Discuss: Hacker News
โœ…Formal Methods
Flag this post
Reflections on Trusting Trust (1984)
web.archive.orgยท3dยท
Discuss: Hacker News
๐Ÿ“กSide-Channel Attacks
Flag this post