How to Use Unsafe in Go Without Killing Your Service
dev.to·1d·
Discuss: DEV
🦀Rust Borrowing
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·18h
🎫Kerberos Attacks
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.com·13h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
CBOR vs. the Other Guys
cborbook.com·4d·
Discuss: Hacker News
📋Protocol Buffers
Flag this post
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
arxiv.org·2d·
Discuss: Lobsters
🧪CBOR Fuzzing
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.com·1d
📝Concrete Syntax
Flag this post
SolarWinds addressed three critical flaws in Serv-U
securityaffairs.com·1d
🏺Kerberos Archaeology
Flag this post
The Rust Community Knew This Was Coming
lucisqr.substack.com·1d·
🦀Rust Borrowing
Flag this post
Type-safe `net/rpc` alternative with context support
reddit.com·12h·
Discuss: r/golang
gRPC
Flag this post
eBPF Rootkit
synacktiv.com·14h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
Nested query strings in depth — a complete technical guide
dev.to·1d·
Discuss: DEV
Format Verification
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·11h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
Dingo: A Meta-Language for Go
github.com·6h·
🦀Rust Macros
Flag this post
What To Know Before Building Fluent Bit Plugins With Go
thenewstack.io·1d
💧Liquid Types
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.pro·1d·
Discuss: Hacker News
🛡️eBPF Programs
Flag this post
Auditing JDBC Drivers at Scale with AI led to 85000 bounty
hacktron.ai·1d·
Discuss: Hacker News
🚀Indie Hacking
Flag this post