QUIC! Jump to User Space!
hackaday.comยท2h
๐ŸŒNetwork Protocols
Why blockchain verification could eliminate Indonesia's $22 billion fake degree problem
hackernoon.comยท7h
๐Ÿ”—Hash Chains
The Day I Hacked XCTrack
blog.syrac.orgยท3hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท3hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.comยท17h
๐ŸŒŠStreaming Systems
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.orgยท13h
๐Ÿ•ต๏ธVector Smuggling
HTTP/1.1 must die: Dafydd Stuttard on what this means for enterprise security
portswigger.netยท1d
๐Ÿ“กBGP Archaeology
SSH Security: Why You Should Touch to Verify
ubicloud.comยท9hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Terraform Fileset Function: Filter and Deploy Specific Files
spacelift.ioยท3hยท
Discuss: Hacker News
๐ŸงŠArctic Storage
Implementing ZADD If Key Exists
rozumem.xyzยท11hยท
Discuss: Hacker News
โšกRedis Internals
Metasploit Wrap Up 10/09/2025
rapid7.comยท21h
๐Ÿ›ก๏ธeBPF Security
AI Guardrails, Gateways, Governance Nightmares
go.mcptotal.ioยท10hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท6h
๐ŸšจIncident Response
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)
isc.sans.eduยท1d
๐Ÿฆ Malware Analysis
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท1dยท
๐Ÿ”‘Cryptographic Protocols
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.comยท2d
๐Ÿ“ฆContainer Security
A small number of samples can poison LLMs of any size
anthropic.comยท1dยท
๐Ÿ”Vector Forensics