Oops, My UUIDs Collided
alexsci.com·8h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·12h
🛡️eBPF Security
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐DNS over QUIC
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·1d
🔓Decompilation
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.com·1d·
Discuss: Substack
🧪Binary Fuzzing
Flag this post
Show HN: rstructor, Pydantic+instructor for Rust
github.com·9h·
Discuss: Hacker News
🔒Linear Types
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·10h
🔓Hacking
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
λLambda Formalization
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.com·1d
📦Container Security
Flag this post
OpenSMTPD 7.8.0p0 released with security fixes and improvements
discoverbsd.com·15h
🔌Operating system internals
Flag this post
GHC 9.14.1-rc1 is now available
discourse.haskell.org·18h·
🔗Functional Compilers
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·17h
🕵️Vector Smuggling
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·20h
🔐Hash Functions
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·7h
🔓Hacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
The researcher’s desk: CVE-2025-20362
blog.detectify.com·14h
🔓Hacking
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·8h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
Place Capability Graphs: A General-Purpose Model of Rust's Ownership & Borrowing
dl.acm.org·1d·
🦀Rust Borrowing
Flag this post
Metasploit Wrap-Up 10/31/2025
rapid7.com·8h
🛡️CLI Security
Flag this post