Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·3h
🇸🇪Swedish Cryptanalysis
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·1d
💎Information Crystallography
Codeminer42 Dev Weekly #82
blog.codeminer42.com·19h
🎯Gradual Typing
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
Context Engineering for Coding Agents
hackernoon.com·10h
🌳Incremental Parsing
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.to·9h·
Discuss: DEV
🔗Supply Chain
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·16h
🎫Kerberos Attacks
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.org·15h
🔓Hacking
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·1d
📞Session Types
Building Resilient AI Agents on Serverless | Restate
restate.dev·1d·
🧱Immutable Infrastructure
TCDRM: A Tenant Budget-Aware Data Replication Framework for Multi-Cloud Computing
arxiv.org·1d
💾Storage Replication
Hardening SSH with Touch-Verified Hardware Keys
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation
The tiny server is growing.
i.redd.it·1d·
Discuss: r/homelab
🌐IPFS
Why Self-Host?
romanzipp.com·1d·
Discuss: Hacker News
🏠Personal Archives
CubicLog – A single-binary logging server with zero-config smart analytics
github.com·1d·
Discuss: Hacker News
📝Log Parsing
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.com·11h·
Discuss: Hacker News
🧬PostgreSQL Forensics
Parameterized Complexity of s-Club Cluster Edge Deletion
arxiv.org·2d
🧮Kolmogorov Complexity
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·9h·
Discuss: DEV
🔍Vector Forensics
AsyncSpade: Efficient Test-Time Scaling with Asynchronous Sparse Decoding
arxiv.org·1d
⚙️Compression Benchmarking
7-Zip: Information on closed security gaps available
heise.de·1d
💣ZIP Vulnerabilities