Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.org·15h
Effect Handlers
A new breed of analyzers
daniel.haxx.se·7h·
🐛Fuzzing
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·11h
📞Session Types
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.security·22h
🛡️eBPF Security
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·19h
🌊Streaming Systems
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·5h
🔓Hacking
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
APRS over LoRa with RNode | unsigned.io
unsigned.io·8h
📻Homebrew Protocols
GHC Developer Blog: GHC 9.14.1-alpha3 is now available
haskell.org·1d
🔗Functional Compilers
Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2
hex-rays.com·3d
🦀Rust Macros
Metasploit Wrap Up 10/09/2025
rapid7.com·23h
🛡️eBPF Security
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·1d
🔍eBPF
Three ways formally verified code can go wrong in practice
buttondown.com·2h
📜Proof Carrying Code
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·21h
🔲Cellular Automata
English - the hottest programming language of the future
dev.to·1h·
Discuss: DEV
🔄Language Evolution
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·1d
🔐Capability Systems
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ing·11h
🏺ZIP Archaeology
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity