Serialization Security, Binary Protocols, Data Interchange, Schema Validation

Event Design for Streaming Systems: A Primer
iankduncan.comยท3hยท
Discuss: Hacker News
๐ŸŒŠStreaming Databases
Flag this post
Building "CodeBro": My (Pointless) Adventure into AI Agents with Java
dev.toยท13hยท
Discuss: DEV
๐ŸŒณIncremental Parsing
Flag this post
Transaction-Oriented Programming
btmc.substack.comยท1hยท
Discuss: Substack
โšกHardware Transactional Memory
Flag this post
Building checksec without boundaries with Checksec Anywhere
blog.trailofbits.comยท2d
๐ŸงชBinary Fuzzing
Flag this post
Private CA for long-lived internal SSL certificates
certkit.ioยท2dยท
๐Ÿ”Certificate Analysis
Flag this post
Cancer Research UK: Engineering Guidebook: Choosing Your Stack
crukorg.github.ioยท18h
๐Ÿ“žSession Types
Flag this post
Asynchronous Wait-Free Runtime Verification and Enforcement of Linearizability
arxiv.orgยท1d
๐ŸŽฏPerformance Proofs
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.comยท2d
๐Ÿ”“Password Cracking
Flag this post
Spec-Driven Development: The Waterfall Strikes Back
marmelab.comยท8hยท
Discuss: Hacker News
โœ…Format Verification
Flag this post
No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE
modzero.comยท17hยท
๐Ÿ”’Secure Boot
Flag this post
OWASP Top 10 Business Logic Abuse: What You Need to Know
lab.wallarm.comยท2d
๐ŸŒBGP Security
Flag this post
A treap week
blog.mitrichev.chยท3hยท
๐ŸŽจGraph Coloring
Flag this post
Are we ready for the post-quantum era?
techradar.comยท2d
๐Ÿ”Quantum Security
Flag this post
From Complexity to Clarity: Rethinking Layer 7 Protection for Modern Enterprises
corero.comยท1d
๐ŸŒNetwork Security
Flag this post
U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท8h
๐Ÿ›กCybersecurity
Flag this post
Stop Trusting, Start Verifying: Flowork, The Zero-Trust Automation Killer
dev.toยท13hยท
Discuss: DEV
๐ŸŒณArchive Merkle Trees
Flag this post
Lack of Access Control to Incidents
blog.verichains.ioยท1d
๐ŸŽซKerberos Attacks
Flag this post
When Reading the Source Code Is the Real Hack: A Web Challenge Story | v1t CTF
infosecwriteups.comยท9h
๐Ÿ”“Hacking
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python โ€“ A critical review
nocomplexity.comยท1d
๐Ÿ”—Supply Chain
Flag this post
Mastering JSON Prompting for LLMs
machinelearningmastery.comยท1d
๐Ÿ”—Constraint Handling
Flag this post