Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.com·11h
🔓Hacking
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·7h
🛣️BGP Hijacking
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·4h
🌳Archive Merkle Trees
Flag this post
EY 4TB Data Leak
🔓Hacking
Flag this post
Diffusion-Driven Progressive Target Manipulation for Source-Free Domain Adaptation
arxiv.org·22h
📊Learned Metrics
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·11h
🦠Malware Analysis
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.com·15h
🌳Archive Merkle Trees
Flag this post
Tencent/WeKnora
github.com·53m
🤖Archive Automation
Flag this post
Computing High-Frequency Factors in Real Time for Quantitative Models
🌊Streaming Databases
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·13h
λLambda Formalization
Flag this post
I accidentally created digital life. Now I need to figure out how to tune it.
📲syncthing
Flag this post
AI Search Tools Easily Fooled by Fake Content
darkreading.com·1d
🔓Hacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·15h
🦠Parasitic Storage
Flag this post
Notes from RIPE 91
blog.apnic.net·3h
🌐DNS over QUIC
Flag this post
7 Machine Learning Projects to Land Your Dream Job in 2026
machinelearningmastery.com·9h
🤖Advanced OCR
Flag this post
Loading...Loading more...