kemanon's Top FindsLoading...
Show HN: A simple programming centric WordPress: TopCoders.Cloud
topcoders.cloud·6h·
Discuss: Hacker News
🐧Linux
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.com·1d
🔐Cybersecurity
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
8 Top Application Security Tools (2026 Edition)
hackread.com·2d
🦠Malware Analysis
Flag this post
I built sbsh: Persistent terminal sessions with discovery, profiles, and an API
news.ycombinator.com·5h·
Discuss: Hacker News
🐳Docker
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.com·1d
🧱Firewalls
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·21h
🦠Malware Analysis
Flag this post
Valuable News – 2025/11/03
vermaden.wordpress.com·1d
🐧Linux
Flag this post
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
dev.to·1d·
Discuss: DEV
🔒TLS/SSL
Flag this post
One of the most devious malware strains might have been cracked - and it's all thanks to Gen AI
techradar.com·8h
🦠Malware Analysis
Flag this post
Observability Made Easy: How AI & OpenTelemetry Tame Tool Sprawl
dev.to·21h·
Discuss: DEV
🦈Wireshark
Flag this post
Linux Essentials: Managing Files and Folders in a Simulated Company Setup
dev.to·8h·
Discuss: DEV
🐧Linux
Flag this post
A Deep Dive into Multi-Transport Protocol Abstraction in Python
dev.to·11h·
Discuss: DEV
📡TCP/IP
Flag this post
Think DSP second edition
allendowney.com·9h
🐍Python
Flag this post
Exploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities Exposed
research.checkpoint.com·12h
🎯Penetration Testing
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rs·1d·
Discuss: Hacker News
🔐Cryptography
Flag this post
2 men accused of hacking and extorting US companies previously worked for cybersecurity firms
ketv.com·5h
🔐Cybersecurity
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.net·2d·
Discuss: Hacker News
🎯Penetration Testing
Flag this post
Sandbox Strategies For Power Users On Any Platform
androidheadlines.com·15h
🐳Docker
Flag this post
Part 4: Daily Security Habits
open.forem.com·1d·
Discuss: DEV
🔐Cybersecurity
Flag this post
Cloud Performance Beyond the Cloud: Monitoring the Entire Internet Stack
catchpoint.com·5h·
Discuss: DEV
🧱Firewalls
Flag this post