Binary Protocol Testing, Security Validation, Parser Robustness, Format Security

Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
Oops, My UUIDs Collided
alexsci.com·1h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
LibreSSL 4.1.2 and 4.2.1 released with reliability and portability fixes
discoverbsd.com·11h
🔌Operating system internals
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.com·1d·
Discuss: Substack
🧪Binary Fuzzing
Flag this post
Fully-Specified Algorithms for JOSE and COSE is now RFC 9864
self-issued.info·22h
🔑Cryptographic Protocols
Flag this post
The researcher’s desk: CVE-2025-20362
blog.detectify.com·7h
🔓Hacking
Flag this post
Place Capability Graphs: A General-Purpose Model of Rust's Ownership & Borrowing
dl.acm.org·1d·
🦀Rust Borrowing
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·3h
🔓Hacking
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·13h
🔐Hash Functions
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·2h
🧪Property-Based Testing
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
Show HN: IRCd in Pure Bash
github.com·21h·
Discuss: Hacker News
Shell Verification
Flag this post
Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.com·1d
🔧RISC-V Assembler
Flag this post
Roadmap for Improving the Type Checker
forums.swift.org·19h·
💧Liquid Types
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
λLambda Formalization
Flag this post
Guide: TLS and QUIC
moq.dev·5h·
Discuss: Hacker News
🌐DNS over QUIC
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post