Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Why and how Bitcoin uses Merkle trees
johndcook.comยท3dยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Oops, My UUIDs Collided
alexsci.comยท3hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
dev.toยท7hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐ŸบKerberos Archaeology
Flag this post
Guide: TLS and QUIC
moq.devยท7hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท15h
๐Ÿ”Hash Functions
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท13h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.comยท6hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
Flag this post
Attackers dig up $11M in Garden Finance crypto exploit
theregister.comยท8h
๐Ÿ”—Hash Chains
Flag this post
Making MLS More Decentralized
blog.phnx.imยท2dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Flag this post
Registry Analysis
windowsir.blogspot.comยท8hยท
๐Ÿ”NTLM Archaeology
Flag this post
EthVault: A Secure and Resource-Conscious FPGA-Based Ethereum Cold Wallet
arxiv.orgยท2d
๐ŸŒŠStream Ciphers
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท3hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Ÿ”“Decompilation
Flag this post