Parameterized Complexity of s-Club Cluster Edge Deletion
arxiv.org·1d
🧮Kolmogorov Complexity
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·8h
🚨Incident Response
Sorting encrypted data without decryption: a practical trick
dev.to·3h·
Discuss: DEV
🔐Hash Functions
An enough week
blog.mitrichev.ch·23h·
📈Linear programming
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com·1d
🌡️Preservation Entropy
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·4h
🔓Hacking
Beyond Indexes: How Open Table Formats Optimize Query Performance
jack-vanlightly.com·2d·
🚀Query Optimization
A disenshittification moment from the land of mass storage
doctorow.medium.com·6h
🧲Magnetic Philosophy
My BTL1 Review
infosecwriteups.com·8h
🔐Certificate Analysis
It takes a Kraken to scan billions of source files
softwareheritage.org·2d
🏠Homelab Archaeology
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.com·38m·
🛠️Greaseweazle
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·2d
🌐WARC Forensics
Turning data into knowledge: How Huawei is upgrading storage for the AI era
techradar.com·1d
💾Persistence Strategies
We Benchmarked DuckDB, SQLite, and Pandas on 1M Rows: Here’s What Happened
kdnuggets.com·5h
💾SQLite
Ship Broken Things
matmul.net·23h·
Discuss: Hacker News
🔗Topological Sorting
CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection
bitsight.com·21h
🧪CBOR Fuzzing
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.security·21h
🛡️eBPF Security
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.com·4h
🔍NTLM Forensics