Shellshock
dwheeler.com·9h·
Shell Verification
Enhancing File Transfer Security with SSH Key Authentication
blog.sucuri.net·1d
🔐Archive Encryption
Hardening Your AI Agent Against Prompt Injection via MCP
dev.to·6h·
Discuss: DEV
💻Local LLMs
FreeBSD Security Advisory FreeBSD-SA-25:08.openssl
bsdsec.net·10h
🐡OpenBSD
Sandboxing AI Agents at the Kernel Level
greptile.com·1d·
Discuss: Hacker News
📦Container Security
Socket will block it with free malicious package firewall
theregister.com·7h
🔓Open Source Software
CTFs as a Rosetta Stone
bhmt.dev·8h·
Discuss: Hacker News
🔓Hacking
You name it, VMware elevates it (CVE-2025-41244)
blog.nviso.eu·1d
🎫Kerberos Exploitation
Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach
zenodo.org·7h·
Discuss: Hacker News
🏺Kerberos Archaeology
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.edu·4h
🔓Password Cracking
Dorothy – A dotfile ecosystem: cross-shell, cross-OS, cross-arch
github.com·8h·
Discuss: Hacker News
🔌Operating system internals
SENTRY: A Unified Framework for AI/AGI Risk and Defensive Engineering
krypt3ia.wordpress.com·1d
🎯Threat Hunting
FlipSwitch: a Novel Syscall Hooking Technique
elastic.co·1d
🛡️eBPF Security
This is why Linux will never take over the desktop...
forums.anandtech.com·8h
🔌Operating system internals
The eBPF Verifier – How Linux Safely Runs User Code in Kernel Space
qpoint.io·10h·
Discuss: Hacker News
🛡️eBPF Security
First Home Lab with an Office PC.. I got questions regarding security
reddit.com·5h·
Discuss: r/homelab
🖥Home Lab Setup
Strengthening NPM security: Important changes to authentication and tokens
github.blog·11h·
Discuss: Hacker News
🔄Language Evolution
blog.fsck.com·23h
⚔️Lean Tactics
Attack Vector Controls
docs.kernel.org·2d·
Discuss: r/linux
🛡️eBPF Security