BestAV (Fake Antispyware affiliate) exposed
xylibox.comยท8hยท
Discuss: X
๐ŸŒWARC Forensics
Hackers Weaponize QR Codes to Lure Mobile Users into Malicious Links
zimperium.comยท1d
๐Ÿ“ฑQR Archaeology
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioยท3d
๐Ÿ”’Secure Boot
Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene
puri.smยท1d
๐Ÿ”—Supply Chain
Kefir: A new C17/C23 compiler for amd64 Unix
kefir.protopopov.lvยท6hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Don't Let Your Mocks Mock You
revontulet.devยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
AI Prompts for Self-Reflection
josecasanova.comยท1dยท
Discuss: Hacker News
๐Ÿง Personal Knowledge Base
How the Infamous APT 1 Report Exposing Chinaโ€™s PLA Hackers Came to Be
zetter-zeroday.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
EggStreme: New Fileless Malware from a Chinese Apt Targets Philippine Military
securityonline.infoยท1dยท
Discuss: Hacker News
๐Ÿฆ Parasitic Storage
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.chยท1dยท
๐Ÿ›ก๏ธRISC-V Security
Are cybercriminals hacking your systems โ€“ or just logging in?
welivesecurity.comยท2d
๐Ÿ”“Hacking
External Secrets Operator Health update - Resuming Releases
reddit.comยท5hยท
Discuss: r/kubernetes
โš™๏ธProof Engineering
Outbox Done Right in Go: Building Resilient Event-Driven Systems with NATS and SQL
dev.toยท3hยท
Discuss: DEV
๐Ÿ“Database WAL
โ€œBeyond the Obvious: How a Dead-End XXE Led to a Critical SQLi Goldmineโ€
infosecwriteups.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan
dev.toยท1hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
NPM debug and chalk packages compromised
aikido.devยท5dยท
๐ŸบZIP Archaeology
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Archive Cryptanalysis
We're training a text-to-image model from scratch and open-sourcing it
photoroom.comยท1dยท
Discuss: Hacker News
๐ŸŒˆColor Science
Stegoint: Where is steganography? | TryHackMe CTF
infosecwriteups.comยท4d
๐Ÿ•ต๏ธSteganographic Archives
Failed Machine Learning
github.comยท1dยท
Discuss: Hacker News
๐Ÿง Machine Learning