Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com·1d
🌡️Preservation Entropy
We Benchmarked DuckDB, SQLite, and Pandas on 1M Rows: Here’s What Happened
kdnuggets.com·9h
💾SQLite
My old Infocom transcripts
blog.zarfhome.com·1d
🕹️Retro Gaming
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.security·1d
🛡️eBPF Security
Indexing, Hashing
dev.to·1d·
Discuss: DEV
🚀Query Optimization
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·5h·
Discuss: Hacker News
🛡️RISC-V Security
FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.com·10h
🎫Kerberos Exploitation
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🔐Capability Systems
Metasploit Wrap Up 10/09/2025
rapid7.com·1d
🛡️eBPF Security
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
The Day I Hacked XCTrack
blog.syrac.org·8h·
Discuss: Hacker News
🔐PKI Archaeology
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·7h
🎯Threat Hunting
Parameterized Complexity of s-Club Cluster Edge Deletion
arxiv.org·1d
🧮Kolmogorov Complexity
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Proposal: Deconfig – Distributed Git Infrastructure with Durable Objects
github.com·1d·
Discuss: Hacker News
📦Git LFS
Ship Broken Things
matmul.net·1d·
Discuss: Hacker News
🔗Topological Sorting
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.io·3h·
Discuss: Hacker News
🛡️Error Boundaries
From Documents to Dialogue: A step-by-step RAG Journey
dev.to·9h·
Discuss: DEV
📊Multi-vector RAG
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.com·7h
💣ZIP Vulnerabilities