Building our geospatial database in production
🛣️BGP
Flag this post
OP_RETURN Attack Surface Demo
opreturns.github.io·4d
🔐Cybersecurity
Flag this post
Daniel Vérité: Producing UUIDs Version 7 disguised as Version 4 (or 8)
postgresql.verite.pro·3h
🔐Cryptography
Flag this post
[Research] Cross-Stage Vulnerabilities in Large Language Model Architectures
🦠Malware Analysis
Flag this post
NEWS ROUNDUP – 5th November 2025
digitalforensicsmagazine.com·6h
🎯Penetration Testing
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography for Secure Model Aggregation in Cross-Silo Envir...
🔐Cryptography
Flag this post
I built PhantomRaven Hunter, a shell scanner for the recent npm supply chain attack
🦠Malware Analysis
Flag this post
[TUI] Ricing the original Rogue
🔒TLS/SSL
Flag this post
Links 05/11/2025: Medicare Privatisation and "Breaker Box Economy"
techrights.org·9h
🧱Firewalls
Flag this post
Reverse Engineering Googles BotGuard
🔬Reverse Engineering
Flag this post
Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.biz·14h
🔐Cybersecurity
Flag this post
Rust Testing Framework: Build Reliable Code with Built-In Unit and Integration Tests
🔬Reverse Engineering
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·1d
🔐Cryptography
Flag this post
My computer has $18 million worth of RAM in it
aardvark.co.nz·55m
🔐Cybersecurity
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.com·2d
💉SQL Injection
Flag this post
Defeating KASLR by Doing Nothing at All
🐧Linux
Flag this post
Loading...Loading more...