Working for a Vendor with David Gee
blog.ipspace.netยท2h
๐ŸงฒRISC-V Archaeology
The State of Security Protocols in Agent 2 Agent(A2A) Systems.
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Capability Systems
Countless security vulnerabilities in Dell PowerProtect Data Domain closed
heise.deยท1d
๐Ÿ”“Hacking
How to protect your home from burglary
the-independent.comยท1h
๐Ÿ Home Automation
Self-Propagating Malware Hits WhatsApp Users in Brazil
darkreading.comยท23h
๐Ÿ›กCybersecurity
Zero Trust Access Made Simple for Contractors
blog.checkpoint.comยท20h
๐Ÿ›ก๏ธWebAssembly Security
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.bizยท1d
๐Ÿ”“Hacking
Security Model: Wayland vs. Xorg in Linux
openlib.ioยท12hยท
Discuss: Hacker News
๐Ÿ›ก๏ธRISC-V Security
Consider M365 for you homelab if you are already in bed with Microsoft
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ Personal Archives
ELA-1534-1 freeipa security update
freexian.comยท1d
๐ŸŽซKerberos Exploitation
AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest
aws.amazon.comยท13h
๐Ÿ”HSM Integration
CVE-2025-61882: Critical 0day in Oracle E-Business Suite exploited in-the-wild
rapid7.comยท20h
๐Ÿ”“Hacking
RediShell: Critical Remote Code Execution
wiz.ioยท10hยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
Scattered Lapsus$ Hunters offering $10 in Bitcoin to 'endlessly harass' execs
theregister.comยท17h
๐ŸŽซKerberos Attacks
NEWS ROUNDUP โ€“ 6th October 2025
digitalforensicsmagazine.comยท22h
๐ŸšจIncident Response
Inside the 'Trinity of Chaos': How young hackers are uniting to hit big companies
abc.net.auยท2d
๐Ÿ”“Hacking
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.comยท19h
๐Ÿ”“Hacking
Agentic AI Is Quickly Resetting the Internet
thenewstack.ioยท14h
๐ŸŒŠStreaming Systems