Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐ก๏ธeBPF Security
Flag this post
Why and how Bitcoin uses Merkle trees
๐Hash Chains
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐DNS over QUIC
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐ฆ Parasitic Storage
Flag this post
Oops, My UUIDs Collided
๐งชBinary Fuzzing
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
๐Reproducible Builds
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐บKerberos Archaeology
Flag this post
Guide: TLS and QUIC
๐DNS over QUIC
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐ฆ Malware Analysis
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐ต๏ธVector Smuggling
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท15h
๐Hash Functions
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Hacking
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท13h
๐ก๏ธeBPF Security
Flag this post
Attackers dig up $11M in Garden Finance crypto exploit
theregister.comยท8h
๐Hash Chains
Flag this post
Making MLS More Decentralized
๐Archive Encryption
Flag this post
Registry Analysis
๐NTLM Archaeology
Flag this post
EthVault: A Secure and Resource-Conscious FPGA-Based Ethereum Cold Wallet
arxiv.orgยท2d
๐Stream Ciphers
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Decompilation
Flag this post
Loading...Loading more...