Apple fixes critical font processing bug. Update now!
malwarebytes.comยท16h
๐Ÿ” Terminal Fonts
Arch Linux Security with Foxboron and Anthraxx
opensourcesecurity.ioยท2d
๐ŸšNordic Shell
The-Z-Labs/linux-exploit-suggester
github.comยท3d
๐Ÿ“ŸTerminal Forensics
2025 Global State of Authentication survey: A world of difference in cybersecurity habits
yubico.comยท20h
๐Ÿ‡ธ๐Ÿ‡ชNordic Cryptography
Accelerating AWS Infrastructure Deployment: A Practical Guide to Console-to-Code
aws.amazon.comยท3h
๐Ÿ”„Sync Engine
Learn Kubernetes Security book, second edition just published
amazon.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
1Password can now manage ".env" files and secrets
developer.1password.comยท6hยท
Discuss: Hacker News
๐Ÿ› System administration
os-testing POSIX headers everywhere
sortix.orgยท2d
๐Ÿ“บVT100 Emulation
Using the TPDE Codegen Back End in LLVM Orc
weliveindetail.github.ioยท16hยท
Discuss: Hacker News
๐ŸญCompiler Backends
Exploring Data Extraction from iOS Devices: What Data You Can Access and How
blog.digital-forensics.itยท12hยท
๐ŸŽApple Archive
Donโ€™t Let Cyber Risk Kill Your GenAI Vibe: A Developerโ€™s Guide
dev.toยท14hยท
Discuss: DEV
๐Ÿ”“Hacking
Rethinking AI Security: The Dynamic Context Firewall for MCP
blogs.cisco.comยท15h
๐Ÿ”’Language-based security
Plenty of room at the bottom (of the tech stack)
doctorow.medium.comยท1d
๐Ÿ”ŒOperating system internals
Unveiling Remote Code Execution: How Vulnerabilities Lead to System Takeovers - DevConf.US 2025
youtube.comยท18h
๐Ÿ‘๏ธSystem Observability
Ukrainian Cops Spoofed in Fileless Phishing Attacks on Kyiv
darkreading.comยท1d
๐Ÿ”“Hacking
A Programmer's Guide to Logging Best Practices
dash0.comยท13hยท
๐Ÿ“Log Parsing
Leaders call for commercial funding of open-source platforms
reversinglabs.comยท12h
๐Ÿ”“Open Source Software
Using an LLM on the Advent of Code
funcall.blogspot.comยท1dยท
โš”๏ธLean Tactics
Our Stewardship: Where We Are, What's Changing and How We'll Engage
rubycentral.orgยท5hยท
๐Ÿ”—Dependency Resolution