Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·8h
🇸🇪Swedish Cryptanalysis
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·1d
💎Information Crystallography
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·2d
🏺Kerberos Archaeology
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.org·19h
🔓Hacking
The tiny server is growing.
i.redd.it·1d·
Discuss: r/homelab
🌐IPFS
Parameterized Complexity of s-Club Cluster Edge Deletion
arxiv.org·2d
🧮Kolmogorov Complexity
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.com·16h·
Discuss: Hacker News
🧬PostgreSQL Forensics
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·13h·
Discuss: DEV
🔍Vector Forensics
AsyncSpade: Efficient Test-Time Scaling with Asynchronous Sparse Decoding
arxiv.org·1d
⚙️Compression Benchmarking
7-Zip: Information on closed security gaps available
heise.de·1d
💣ZIP Vulnerabilities
Kubernetes 1.34 Features Explained
scaleops.com·2d·
Discuss: Hacker News
📦Container Security
Quantum-Aware Symbolic Defense System
dev.to·2d·
Discuss: DEV
🔐Cryptographic Archaeology
CubicLog – A single-binary logging server with zero-config smart analytics
github.com·1d·
Discuss: Hacker News
📝Log Parsing
How I found an unauthenticated goldmine of PII
infosecwriteups.com·1d
🔓Hacking
Organizations, Like Code, Deserve Refactoring
robbyonrails.com·1d·
Discuss: Hacker News
🔄Language Evolution
Software Architecture Horror Story
blog.mihaisafta.com·10h·
Discuss: Hacker News
🔌Interface Evolution
Responsible Vibe Coding
dev.to·2h·
Discuss: DEV
📏Code Metrics
Multi-Cluster command execution?
reddit.com·5h·
Discuss: r/kubernetes
📦Container Security
Interviewing Intel's Chief Architect of x86 Cores
chipsandcheese.com·2d·
🧲RISC-V Archaeology