Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
Oops, My UUIDs Collided
alexsci.com·1h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·1d
🕵️Steganographic Archives
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.com·1d
🦠Parasitic Archives
Flag this post
Tech With Tim: 3 Unique Python Features You NEED To Know
dev.to·1h·
Discuss: DEV
🔗Concatenative Programming
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.com·52m·
🗂Data structures
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·13h
🔐Hash Functions
Flag this post
DeshadowMamba: Deshadowing as 1D Sequential Similarity
arxiv.org·2d
🌀Fractal Compression
Flag this post
Cut the Noise, Keep the Signal: The Hidden Cost of Duplicate Reports
hackerone.com·2d
Archive Fixity
Flag this post
Registry Analysis
windowsir.blogspot.com·6h·
🔍NTLM Archaeology
Flag this post
An introduction to OCI Containers on FreeBSD
freebsdfoundation.org·2h
📦METS Containers
Flag this post
Rdza – Rust Programming, in Polish
github.com·10h·
Discuss: Hacker News
🦀Rust Macros
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·7h·
Discuss: Hacker News
🔍NTLM Forensics
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·22h
🌳Archive Merkle Trees
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.com·1d
🦠Malware Analysis
Flag this post
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
koi.ai·1d·
📦Package Managers
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.com·1h
🔓Hacking
Flag this post