kemanon's Top FindsLoading...
Show HN: Polyglot Docker dev environment setup โ€“ C/C++/Rust/Python
github.comยท8hยท
Discuss: Hacker News
๐ŸณDocker
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท19hยท
Discuss: Hacker News
๐Ÿ”’TLS/SSL
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท7hยท
Discuss: DEV
๐Ÿ”’TLS/SSL
Flag this post
HTB: Dump
0xdf.gitlab.ioยท2h
๐ŸฆˆWireshark
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.comยท12hยท
๐ŸงLinux
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.comยท22h
๐Ÿฆ Malware Analysis
Flag this post
What is Domain Name System? A computer engineer explains this foundational piece of the web
techxplore.comยท20h
๐ŸŒDNS
Flag this post
Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
blogger.comยท23h
๐Ÿ”Cybersecurity
Flag this post
Dive into Systems
diveintosystems.orgยท19hยท
Discuss: Hacker News
๐Ÿ’ปComputer Science
Flag this post
Ransomware Defense Using the Wazuh Open Source Platform
thehackernews.comยท1h
๐Ÿฆ Malware Analysis
Flag this post
DNS Under Strain: Technical and Policy Challenges in Supporting the Internet of Autonomous Things
circleid.comยท19h
๐ŸŒDNS
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers Part 2
bastille.netยท5h
๐ŸฆˆWireshark
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
InfoSec News Nuggets 11/04/2025
aboutdfir.comยท30m
๐Ÿ”Cybersecurity
Flag this post
Build your own GPG in Rust
andrewhalle.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ”’TLS/SSL
Flag this post
What would you do? Opening my lab to the internet, DNS/cert/design/security questions.
reddit.comยท19hยท
Discuss: r/homelab
๐ŸŒDNS
Flag this post
9to5Linux Weekly Roundup: November 2nd, 2025
9to5linux.comยท1d
๐ŸงLinux
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.orgยท7h
๐Ÿ”’TLS/SSL
Flag this post
Report: Maritime Suppliers Face Exposure to Growing Cybersecurity Threats
supplychainbrain.comยท7h
๐Ÿ”Cybersecurity
Flag this post
What data do coding agents send, and where to?
chasersystems.comยท41mยท
Discuss: Hacker News
๐ŸŽฏPenetration Testing
Flag this post
Could Ubuntu be a reasonably secure "just works" alternative to Fedora?
discuss.privacyguides.netยท1d
๐ŸงLinux
Flag this post