We will WARC you: preserving access to published CD-ROMs at NLA
dpconline.org·12h
Flag this post
The InsightOS architecture
feedly.com·20h
🐧Linux
Flag this post
Jamf Threat Labs uncovers mobile app game leaking player credentials
jamf.com·17h
🔐Cybersecurity
Flag this post
Analysis of NGate malware campaign (NFC relay)
🔒TLS/SSL
Flag this post
Microsoft Warns Windows 10 Users: Hackers Target Outdated Systems
blogger.com·2d
🔐Cybersecurity
Flag this post
Hackers are teaming up with organized crime gangs to steal cargo right from supply chains
techradar.com·1d
🔐Cybersecurity
Flag this post
4 awesome (and practical) things you can do with a terminal on Android
howtogeek.com·16h
🔑SSH
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.sc·16h
🦠Malware Analysis
Flag this post
Confidential Computing To Secure AI Workloads
semiengineering.com·1h
Flag this post
An Analysis of Early-Stage Functional Safety Analysis Methods and Their Integration into Model-Based Systems Engineering
arxiv.org·4h
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.com·2d
🦠Malware Analysis
Flag this post
I built PhantomRaven Hunter, a shell scanner for the recent npm supply chain attack
🦠Malware Analysis
Flag this post
List Decoding and New Bicycle Code Constructions for Quantum LDPC Codes
arxiv.org·4h
🔐Cryptography
Flag this post
Loading...Loading more...