The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·3h
🎫Kerberos Attacks
The State of Security Protocols in Agent 2 Agent(A2A) Systems.
dev.to·1d·
Discuss: DEV
🔐Capability Systems
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·7h
🔐Cryptographic Archaeology
Zero Trust Access Made Simple for Contractors
blog.checkpoint.com·6h
🛡️WebAssembly Security
How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
tenable.com·6h
🔗Data Provenance
OO Design Principles: GRASP patterns
slott56.github.io·2d
🔒WASM Capabilities
Reading the ENISA Threat Landscape 2025 report
securityaffairs.com·12h
🎯Threat Hunting
It’s time the UK got proactive about software security
techradar.com·5h
❄️Nix Adoption
Sources of Power in Organizations
leadingsapiens.com·3h·
Discuss: Hacker News
🔐Capability Systems
Public Key Infrastructure with Secure Shell
free-pmx.org·1d·
Discuss: r/homelab
🎯NTLM Attacks
Harden Windows Safely, Securely, Only with Official Microsoft Methods
hotcakex.github.io·18h·
Discuss: Hacker News
🔒Secure Boot
Cap'n Proto in WASM
mikel.xyz·10h·
Discuss: Hacker News
🌐WASI
The Engineer’s Guide to Automation Maturity
thenewstack.io·6h
📏Code Metrics
Design Principle: Composable Services
sleepingpotato.com·6h·
Discuss: Hacker News
gRPC
Are Software Registries Inherently Insecure?
developers.slashdot.org·18h
📦Container Security
Stalwart Labs
stalw.art·10h
Archive Fixity
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·15h
🔐Capability Systems
WireGuard topologies for self-hosting at home
garrido.io·2d·
📡Network Protocol Design
FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·4h
🔐Certificate Analysis