Zero Trust becomes the foundation of cyber security
militaryaerospace.com·9h·
Discuss: Hacker News
🔓Hacking
Best open source auth tools
cerbos.dev·2d·
🔐Capability Systems
Public Key Infrastructure with Secure Shell
free-pmx.org·5h·
Discuss: r/homelab
🎯NTLM Attacks
EasyOS – An experimental Linux distribution (2025)
easyos.org·12h·
Discuss: Hacker News
🔌Operating system internals
Red Stone One Carat — TryHackMe Challenge Write-up
infosecwriteups.com·19h
🛡️CLI Security
Plugin Secure
rya.nc·19h·
Discuss: Hacker News
Checksum Validation
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan
dev.to·14h·
Discuss: DEV
🎯Threat Hunting
Bootstrapping SecureDrop Workstation via Qubes-Contrib
securedrop.org·2d
🛡️RISC-V Security
A History of Active Directory Security
adsecurity.org·1d
🏺Kerberos Archaeology
Product update: Smarter fraud detection, smoother user journeys
fingerprint.com·2d
🏺Kerberos Archaeology
Adaptive Environmental Monitoring and Smart Access Controll
hackster.io·2d
🏠Home Automation
sopass and cross-device syncing in a password manager
blog.liw.fi·1d
🔀CRDT
eSIM Best Practices for iPhone & iPad: Setting the Gold Standard in Mobile Security for 2025 and Beyond
jamf.com·3d
🔐HSM Integration
Trusted enclaves from Intel and AMD shown vulnerable to physical attacks
techspot.com·1d·
Discuss: r/technews
🛡️RISC-V Security
Show HN: Radkit, A2A focused rust agents SDK
github.com·15h·
Discuss: Hacker News
🦀Embedded Rust
This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model
hackaday.com·1d
🛡️RISC-V Security
Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure
wired.com·19h
🛡Cybersecurity