Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.toยท9hยท
Discuss: DEV
๐Ÿ”Quantum Security
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท3d
๐Ÿ”Audio Forensics
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท1d
๐Ÿ›ก๏ธeBPF Security
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท1d
๐Ÿ”Hash Functions
Flag this post
Encryption is under attack โ€“ but it's "vital for law enforcement," said former US investigator
techradar.comยท1d
๐Ÿ”“Hacking
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท3d
๐Ÿฆ Malware Analysis
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท2dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท2d
๐Ÿฆ Parasitic Storage
Flag this post
Registry Analysis
windowsir.blogspot.comยท1dยท
๐Ÿ”NTLM Archaeology
Flag this post
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
securityaffairs.comยท1d
๐Ÿ›กCybersecurity
Flag this post
Windows Defender vs Avast: The Better Choice?
forums.anandtech.comยท10h
๐Ÿ•ธ๏ธWASM Archives
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท2d
๐ŸŒDNS Security
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.eduยท3d
๐Ÿ“ŸTerminal Forensics
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท22h
๐Ÿ”“Hacking
Flag this post
Speedrunning an RL Environment
sidb.inยท8hยท
Discuss: Hacker News
โš”๏ธLean Tactics
Flag this post
A Few Comments on 'Age'
neilmadden.blogยท4dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท2d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
The internet was made for privacy
doctorow.medium.comยท1d
๐ŸงฒMagnetic Philosophy
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Hewlett Packard Journal Archives
worldradiohistory.comยท29mยท
Discuss: Hacker News
๐ŸŒWeb Archives
Flag this post