Meet the Researcher: Nitya Nadgir
blog.citp.princeton.eduΒ·2d
🏴󠁧󠁒󠁳󠁣󠁴󠁿Scottish Computing
Integrating Clusters
optional.isΒ·2d
πŸ‡ΈπŸ‡ͺNordic Algorithms
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioΒ·3d
πŸ”’Secure Boot
Unaccountable systems
whynothugo.nlΒ·2dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
Procedural Island Generation
brashandplucky.comΒ·3dΒ·
Discuss: Hacker News
πŸ“ŠComputational Geometry
We Spiral
behavioralscientist.orgΒ·1hΒ·
Discuss: Hacker News
🎯Threat Hunting
osqzss/gps-sdr-sim
github.comΒ·3d
πŸ—œοΈLZSS Variants
Official says gangs killed dozens in small fishing village in Haiti's latest massacre
the-independent.comΒ·2d
πŸ›£οΈBGP Hijacking
How Are You Preparing for AI-Powered Cyber Threats?
dev.toΒ·2dΒ·
Discuss: DEV
🎯Threat Hunting
Russian APT Attacks Kazakhstan's Largest Oil Company
darkreading.comΒ·3dΒ·
Discuss: Hacker News
🎫Kerberos Attacks
Historically Black colleges issue lockdown orders, cancel classes after receiving threats
the-independent.comΒ·2d
🎯Threat Hunting
Your elected leaders: Taiji Kimura, Routing Security SIG Acting Chair
blog.apnic.netΒ·6d
🌐Network Security
Unlocking Team Superpowers: The Secret Language of Spatial Harmony by Arvind Sundararajan
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”²Cellular Automata
'MostereRAT' Malware Blends In, Blocks Security Tools
darkreading.comΒ·5d
πŸ”“Hacking
Dell Optiplex 3070 + Synology NAS OR Custom build?
reddit.comΒ·3hΒ·
Discuss: r/homelab
🏠Homelab Preservation
Block | TryHackMe CTF writeup
infosecwriteups.comΒ·5d
🎯NTLM Attacks
Real-Time Genome Sequencing Error Correction via Dynamic Bayesian Graph Refinement
dev.toΒ·4dΒ·
Discuss: DEV
🧬Bitstream Evolution
The Surprisingly Smooth Secret Behind Robot Motion: Flow Fields
dev.toΒ·1dΒ·
Discuss: DEV
πŸ€–Tape Automation
Unlocking AI's Potential: Differentiable Planning for Smarter Voice Agents
dev.toΒ·1dΒ·
Discuss: DEV
πŸŽ™οΈWhisper