Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.comΒ·12h
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comΒ·1d
πŸ’ŽInformation Crystallography
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.comΒ·2d
🏺Kerberos Archaeology
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.orgΒ·23h
πŸ”“Hacking
The tiny server is growing.
i.redd.itΒ·1dΒ·
Discuss: r/homelab
🌐IPFS
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.comΒ·20hΒ·
Discuss: Hacker News
🧬PostgreSQL Forensics
Buy GitHub Accounts
dev.toΒ·2hΒ·
Discuss: DEV
🏠Personal Archives
How I found an unauthenticated goldmine of PII
infosecwriteups.comΒ·1d
πŸ”“Hacking
Organizations, Like Code, Deserve Refactoring
robbyonrails.comΒ·1dΒ·
Discuss: Hacker News
πŸ”„Language Evolution
Software Architecture Horror Story
blog.mihaisafta.comΒ·14hΒ·
Discuss: Hacker News
πŸ”ŒInterface Evolution
Multi-Cluster command execution?
reddit.comΒ·9hΒ·
Discuss: r/kubernetes
πŸ“¦Container Security
Interviewing Intel's Chief Architect of x86 Cores
chipsandcheese.comΒ·2dΒ·
🧲RISC-V Archaeology
Cybercrime ring GXC Team dismantled in Spain, 25-year-old leader detained
securityaffairs.comΒ·3h
πŸ”“Hacking
The Rise of Reactive Backends That Adapt in Real Time
dev.toΒ·15hΒ·
Discuss: DEV
🌊Streaming Systems
Autonomous AI Hacking and the Future of Cybersecurity
schneier.comΒ·1dΒ·
Discuss: Hacker News
🎯Threat Hunting
A Manifesto for the Programming Desperado
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ’»Programming languages
Building Actual Peer-to-peer Applications: Outside Misconceptions
hackernoon.comΒ·3d
🌐Distributed Hash
Padding
reddit.comΒ·17hΒ·
Discuss: r/golang
πŸ”§KAITAI
Building a Universal Webhook Adapter in Go: Introducing WHOOK
dev.toΒ·1dΒ·
Discuss: DEV
🌐WASI