Critical UniFi OS Flaw Enables Remote Code Execution
gbhackers.comยท1hยท
Discuss: Hacker News
โš™๏ธSystem Programming
Flag this post
Cyber experts warn of the 'catastrophic' threat quantum computing could pose
9news.com.auยท5hยท
Discuss: Hacker News
๐ŸงLinux
Flag this post
OVHcloud: Quantum random number generation SSL certificates for all customers
blog.ovhcloud.comยท1dยท
Discuss: Hacker News
๐Ÿ“System Design
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.comยท4hยท
Discuss: Hacker News
๐ŸงLinux
Flag this post
What data do coding agents send, and where to?
chasersystems.comยท4hยท
Discuss: Hacker News
๐Ÿ’ปProgramming
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.aiยท1hยท
Discuss: Hacker News
๐Ÿ—๏ธSoftware Design
Flag this post
The Louvre's surveillance system used insecure passwords such as "LOUVRE"
redhotcyber.comยท1dยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท1dยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
The race to shore up Europeโ€™s power grids against cyberattacks and sabotage
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ“System Design
Flag this post
OAuth Device Code Phishing: Azure vs. Google Compared
bleepingcomputer.comยท1dยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
Reflections on Trusting Trust (1984)
web.archive.orgยท2dยท
Discuss: Hacker News
๐Ÿ’ปProgramming
Flag this post
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
pcmag.comยท2hยท
Discuss: Hacker News
๐ŸงLinux
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsยท23hยท
Discuss: Hacker News
๐ŸนGolang
Flag this post
Transportation Companies Hacked to Steal Cargo
securityweek.comยท1hยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
Invasion of the message body snatchers! Teams flaw allowed crims to impersonate the boss
theregister.comยท2hยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
ISC2 Security Congress: The shaky state of AI security today
scworld.comยท2dยท
Discuss: Hacker News
โš™๏ธSystem Programming
Flag this post
Show HN: I gamified passwords to make them easier to remember
passwordgame.apps.benthayer.comยท13hยท
Discuss: Hacker News
๐Ÿ’ปProgramming
Flag this post
Why should I accept all cookies?
idiallo.comยท2dยท
Discuss: Hacker News
๐Ÿ—๏ธSoftware Design
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท23hยท
Discuss: Hacker News
๐Ÿ“System Design
Flag this post
The ZeroAccess Developer and His Windows Kernel-Mode Debugger
r136a1.devยท2dยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post