When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·2d
🦠Malware Analysis
Flag this post
Directory Traversal Attacks
dev.to·1d·
Discuss: DEV
💉SQL Injection
Flag this post
The ZeroAccess Developer and His Windows Kernel-Mode Debugger
r136a1.dev·9h·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
AI Red Teaming Guide
github.com·3d·
Discuss: Hacker News
🔬Reverse Engineering
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·4d·
Discuss: Hacker News
🦈Wireshark
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.com·12h·
Discuss: Hacker News
🔐Cybersecurity
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·2d·
Discuss: Hacker News
🦈Wireshark
Flag this post
Continuous Performance Testing: staying fast
tweag.io·4d
🦈Wireshark
Flag this post
Speedrunning an RL Environment
sidb.in·1d·
Discuss: Hacker News
🐍Python
Flag this post
Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw
csoonline.com·1d·
Discuss: r/technology
🔐Cybersecurity
Flag this post
AISLE discovered three new OpenSSL vulnerabilities
lesswrong.com·3d
🔐Cybersecurity
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·2d
🔐Cybersecurity
Flag this post
Project 2
dev.to·20h·
Discuss: DEV
🔬Reverse Engineering
Flag this post
Cloudflare unveils registry format for bot and agent authentication
ppc.land·17h
🔒TLS/SSL
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·3d
🦠Malware Analysis
Flag this post
The Death of the Security Checkbox: BAS Is the Power Behind Real Defense
thehackernews.com·3d
🔐Cybersecurity
Flag this post
Imaging having The Witcher on your dev team...
dev.to·2d·
Discuss: DEV
🔬Reverse Engineering
Flag this post
A/B Testing Could Lead LLMs to Retain Users Instead of Helping Them
newsletter.danielpaleka.com·6h·
Discuss: Hacker News
🐍Python
Flag this post
Generative and Predictive AI in Application Security: A Comprehensive Guide
dev.to·2d·
Discuss: DEV
🦠Malware Analysis
Flag this post
Beyond the LLM: The 8 Essential Components for Building Reliable AI Agents and Where Coding Tools Fit In
youtu.be·1d·
Discuss: DEV
🐍Python
Flag this post