QA/Dev Report: October 2025
qa.blog.documentfoundation.org·2h
Flag this post
Cyberattacks on UK water systems reveal rising risks to critical infrastructure
malwarebytes.com·3h
🔐Cybersecurity
Flag this post
State of the Source at ATO 2025: Cybersecurity
opensource.org·2d
🎯Penetration Testing
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
🔬Reverse Engineering
Flag this post
AI browsers are clicking the same scams you’d never fall for
makeuseof.com·21m
Flag this post
The OWASP AI/LLM Top 10: Understanding Security and Privacy Risks in AI-Powered Mobile Applications
nowsecure.com·1d
🦠Malware Analysis
Flag this post
CasWAF: open-source web application firewall supporting reverse proxy, SSL cert HTTP-01 auto-apply, UA & IP based firewall rules
🧱Firewalls
Flag this post
What I Learned From Working on Legacy Codebases (And How It Made Me a Better Developer)
🔬Reverse Engineering
Flag this post
ServBay for Windows 1.11.1 Released: Refactoring the Core Experience for Unprecedented Flexibility and Efficiency
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.sc·21h
🦠Malware Analysis
Flag this post
Confidential Computing To Secure AI Workloads
semiengineering.com·6h
Flag this post
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
thehackernews.com·7h
🦠Malware Analysis
Flag this post
Puran File Recovery Portable 2.0
majorgeeks.com·12m
🔬Reverse Engineering
Flag this post
Loading...Loading more...