Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Digital Privacy
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท5h
๐Ÿ”eBPF
Flag this post
Credentials Evidence or Simulate
preludes.euยท1dยท
Discuss: Hacker News
๐Ÿ”’Digital Privacy
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers Part 2
bastille.netยท1d
๐ŸŒNetwork Security
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.comยท22hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท1d
๐ŸŒNetwork Security
Flag this post
Part 4: Daily Security Habits
open.forem.comยท1dยท
Discuss: DEV
๐Ÿ”Hardware Security
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท1dยท
Discuss: Hacker News
๐Ÿ“‹Protocol Design
Flag this post
Build your own GPG in Rust
andrewhalle.github.ioยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Building a highly-available web service without a database
screenshotbot.ioยท1hยท
Discuss: r/programming
๐Ÿฆ€Rust
Flag this post
Building and running Request Tracker as a quadlet container
developers.redhat.comยท3h
๐Ÿ”ŒgRPC
Flag this post
Ubuntu Blog: Edge Networking gets smarter: AI and 5G in action
ubuntu.comยท3h
๐ŸŒEdge Computing
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsยท1dยท
Discuss: Hacker News
๐Ÿ”ChaCha20
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.toยท16hยท
Discuss: DEV
๐Ÿ“ฆSerde
Flag this post
Invasion of the message body snatchers! Teams flaw allowed crims to impersonate the boss
theregister.comยท20hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCybersecurity
Flag this post
HTB: Dump
0xdf.gitlab.ioยท1d
๐Ÿ”eBPF
Flag this post
How does HTTP work?
corero.comยท7hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.netยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Security
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.comยท1dยท
๐ŸงLinux
Flag this post
Human friendly industrial device IDs
bec-systems.comยท9hยท
Discuss: Hacker News
๐Ÿท๏ธMemory Tagging
Flag this post