Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.com·2d
🔍Binary Forensics
103: We Can’t Trust
mwl.io·1d
💾Persistence Strategies
Getting Started with AI Hacking Part 2: Prompt Injection
blackhillsinfosec.com·3d
🕵️Vector Smuggling
Salesforce data breach: what you need to know
fortra.com·3d
🎫Kerberos Attacks
Oracle Security Alert Advisory - Kudelski Security Research Center
kudelskisecurity.com·5d
🛡️eBPF Security
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·18h·
Discuss: Hacker News
🦀Rust Macros
Roll your own bot detection: fingerprinting/JavaScript
blog.castle.io·3d·
Discuss: Hacker News
🔗Binary Similarity
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·1d·
Discuss: Hacker News
🌊Stream Processing
[R] DeepSeek 3.2's sparse attention mechanism
reddit.com·1d·
🌀Brotli Internals
Framework under fire for Omarchy/DHH/Hyprland support?
crimier.github.io·6h·
Discuss: Hacker News
🐚Nordic Shell
Oracle Clop Data Theft Campaign Started Months Ago
decipher.sc·1d
🔓Hacking
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
securityaffairs.com·1d
🕵️Vector Smuggling
Quantum Agents: The Algorithmic Alchemists Reshaping Discovery
dev.to·6h·
Discuss: DEV
⚛️Quantum Algorithms
Agent Diary: Oct 10, 2025 - The Great Merge Convergence: When Five Days of Work Finally Shake Hands
dev.to·1d·
Discuss: DEV
🔄Language Evolution
Enhanced Arc-Fault Current Detection via Dynamic Bayesian Network Inference
dev.to·7h·
Discuss: DEV
🌊Stream Processing
Attackers Season Spam With a Touch of 'Salt'
darkreading.com·3d
📡Feed Security
Adversary TTP Simulation Lab
infosecwriteups.com·4d
🏠Homelab Pentesting
I created and open sourced an LLM and backend orchestration system
reddit.com·2d·
Discuss: r/golang
🌀Brotli Internals
Computer vision AI VTI’s against Phishing
vmray.com·3d
👁️Perceptual Hashing