IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.org·3d·
Discuss: Hacker News
🌳Archive Merkle Trees
HTB Sherlocks: Meerkat Walkthrough
infosecwriteups.com·16h
🎫Kerberos Exploitation
Use mutation testing to find the bugs your tests don't catch
blog.trailofbits.com·12h
🧪Property-Based Testing
How Python Type Hints Transform Code Quality and Reduce Bugs in Modern Development
dev.to·13h·
Discuss: DEV
🔬Refinement Types
A new home for Fixity Pro: the OPF to maintain the file integrity tool
openpreservation.org·8h
Archive Fixity
Obscure Emacs package appreciation: backup-walker
sachachua.com·10h
📊Differential Backup
How we built a flywheel to steadily improve security for Amazon RDS
aws.amazon.com·1d
👁️Observatory Systems
How to join the desync endgame: Practical tips from pentester Tom Stacey
portswigger.net·7h
🛣️BGP Hijacking
JDK 25 LTS Released with TLS Key Exporters, Improved Debugging
linuxiac.com·1d
🛡️CBOR Security
Unusual Memory Bit Patterns | Software Verify
softwareverify.com·16h
🧠Separation Logic
OTW - Bandit Level 4 to Level 5
tbhaxor.com·3d
🔧KAITAI
Postgres 18 OAuth2 Authentication – Building a Custom OAuth2 Validator in Rust
enterprisedb.com·4h·
Discuss: Hacker News
🦀Rust Verification
Infinite payloads? The future of API Testing with dynamic fuzzing
blog.detectify.com·14h
🧪Binary Fuzzing
FreeBSD Errata Notice FreeBSD-EN-25:15.arm64
bsdsec.net·2d
🐡OpenBSD
Safe Chain: Stopping Malicious NPM Packages Before They Wreck Your Project
aikido.dev·1d·
Discuss: Hacker News
📦Container Security
Meditations on Metadata Remediation: Lessons Learned From Digital Collection Internships
blogs.lib.umich.edu·4h
🏺Media Archaeology
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.org·6h·
Discuss: Hacker News
🔐Capability Systems
Managing dependency graph in a large codebase
tweag.io·23h
📊Dependency Graphs
Exploring Uploads in a Dshield Honeypot Environment [Guest Diary], (Thu, Sep 18th)
isc.sans.edu·22h
🦠Malware Analysis