[Showcase] WulfVault – self-hosted secure file sharing with audit logs, large file support and custom branding
reddit.com·14h·
Discuss: r/homelab
🗄️File Systems
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·14h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
Your organization’s top 4 data protection best practices
proton.me·3d
🔗Data Provenance
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.com·2d
🔌Operating system internals
Flag this post
Show HN: Hirosend – Simple Encrypted File Sharing
hirosend.com·1d·
Discuss: Hacker News
🔐Homomorphic Encryption
Flag this post
Post-Quantum Cryptography in .NET
devblogs.microsoft.com·4d·
Discuss: Hacker News
🔐Quantum Security
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·9h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Weekly Update 479
troyhunt.com·2h
🔒Privacy Archives
Flag this post
Show HN: Enklayve – Free, Local, Private, and Secure Personal AI
enklayve.com·7h·
Discuss: Hacker News
🏠Homelab Compression
Flag this post
How archiving is adapting to digital creativity
culturalcontent.substack.com·2d·
Discuss: Substack
🧲Magnetic Philosophy
Flag this post
Remote Forensic Collection Tools 2025
cybertriage.com·3d
🚨Incident Response
Flag this post
The Evolving Ethics of Medical Data Stewardship
arxiv.org·2d
⚖️Archive Ethics
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🔤EBCDIC Privacy
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
The AI Security Playbook: Match Your Testing to Your Maturity
hackerone.com·2d
🔐Capability Systems
Flag this post
Use the 3-2-1 Rule to Back Up All Your Important Files
lifehacker.com·2d
💿Backup Strategies
Flag this post