Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️eBPF Security
Flag this post
Reactive Tree Management in Nuxt 4: How I Modeled Complex Hierarchies with Pinia
dev.to·19h·
Discuss: DEV
🗄️Database Internals
Flag this post
Recovering Data from the OceanGate depths
hackaday.com·1d
Circuit Archaeology
Flag this post
Fungus: The Befunge CPU(2015)
bedroomlan.org·1d·
Discuss: Hacker News
Homebrew CPUs
Flag this post
Registry Analysis
windowsir.blogspot.com·1d·
🔍NTLM Archaeology
Flag this post
Belhold! My setup.
reddit.com·20h·
Discuss: r/homelab
🏠HomeLab
Flag this post
Never Use Text Pixelation To Redact Sensitive Information | Bishop Fox
bishopfox.com·4h
🧪Archive Fuzzing
Flag this post
EY 4TB Data Leak
neosecurity.nl·2d·
Discuss: Hacker News
🔓Hacking
Flag this post
Entropy in algorithm analysis
11011110.github.io·9h
🧮Kolmogorov Complexity
Flag this post
MSAB Whitepaper – Investigating RAM In A Mobile Device
forensicfocus.com·2d
🧠Memory Forensics
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·2d
🌐DNS Security
Flag this post
NetBSD developer shares GSoC 2025 Mentor Summit experience in Munich
discoverbsd.com·17h
🐡OpenBSD
Flag this post
Best Open Source Observability Solutions
clickhouse.com·1d·
Discuss: Hacker News
📊Homelab Monitoring
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·2d
🔐Hash Functions
Flag this post
Web Hosting Sticker Shock
zanshin.net·12h
🏠Personal Archives
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.com·1d
📄Document Digitization
Flag this post
Using the expand and contract pattern for schema changes
prisma.io·1d·
Discuss: Hacker News
🔄Schema Evolution
Flag this post
Research roundup: 6 cool science stories we almost missed
arstechnica.com·15h
🦴Database Paleontology
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.io·1d
📟Terminal Forensics
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·2d
🕵️Steganographic Archives
Flag this post