From the Browser to the Bloodstream
puri.sm·4h
🔗Data Provenance
What I Learned About Logging and Detection Strategies from Moving House
cosive.com·19h·
Discuss: Hacker News
🎯Threat Hunting
Forensic journey: hunting evil within AmCache
securelist.com·1d
🔍Binary Forensics
Why your Mac is next: how amateur data stealers became a business
jamf.com·2d
📟Terminal Forensics
DOS Game Club
dosgameclub.com·1h·
Discuss: Hacker News
🕹️Retro Gaming
GNU libmicrohttpd2 Audit Complete!
ostif.org·2d
🧪Binary Fuzzing
Decoding Netflix's AV1 Streams: Here are 10 things I found
singhkays.com·1d
🎬AV1 Encoding
FPGA Security Features
controlpaths.com·22h·
Discuss: Hacker News
🌊Stream Ciphers
Show HN: Freezy Transcribe – Transcribe podcasts, first responder feeds and more
apps.apple.com·1d·
Discuss: Hacker News
🎵Audio Streaming
Numeric Pager Code Encoder Tool (Look Alike Cipher)
fcsuper.blogspot.com·17h·
🔤Character Encoding
Technical Analysis of SAP Exploit Script Used in JLR, Harrods Hacks
detect.fyi·1d·
Discuss: Hacker News
💣ZIP Vulnerabilities
A gentle introduction to GEMM using MMA tensor cores
am17an.bearblog.dev·9h·
Discuss: Hacker News
📊RISC-V Vectors
Vibecoding a Cyberpunk 3D GUI for System Commissioning
blog.funcall.org·31m·
Discuss: Hacker News
🧩WASM Components
InfoSec News Nuggets 10/02/2025
aboutdfir.com·4h
🔓Hacking
Why EDR Missed the GeoServer Exploit: The Case for Cloud Application Detection & Response (CADR) | Oligo Security
oligo.security·5h
🦠Malware Analysis
Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach
zenodo.org·1d·
Discuss: Hacker News
🏺Kerberos Archaeology
Gernot's List of Systems Benchmarking Crimes
gernot-heiser.org·1d·
🎯Performance Forensics
WiFi Can See You
coffee.link·10h·
Discuss: Hacker News
🏠Home Automation
SMS: Self-supervised Model Seeding for Verification of Machine Unlearning
arxiv.org·1d
🧠Machine Learning