FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.comΒ·6h
πŸ”’Hardware Attestation
Discord discloses third-party breach affecting customer support data
securityaffairs.comΒ·1h
πŸ›‘Cybersecurity
The 47-Day Certificate Ultimatum: How Browsers Broke the CA Cartel
certkit.ioΒ·6hΒ·
Discuss: DEV, Hacker News
πŸ”PKI Archaeology
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.orgΒ·17h
πŸ”Capability Systems
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.comΒ·8h
πŸ“¦Container Security
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.comΒ·9h
πŸ”Cryptographic Archaeology
Nix pills
nixos.orgΒ·1d
❄️Nixpkgs
AuditKit: Multi-framework compliance scanner that shows what auditors need
auditkit.ioΒ·1dΒ·
Discuss: Hacker News
πŸ•΅οΈPenetration Testing
NEWS ROUNDUP – 6th October 2025
digitalforensicsmagazine.comΒ·10h
🚨Incident Response
It’s time the UK got proactive about software security
techradar.comΒ·7h
❄️Nix Adoption
Applied Networking Research Prize 2026 Nominations Now Open
ietf.orgΒ·8h
πŸ“‘Network Protocol Design
Public Key Infrastructure with Secure Shell
free-pmx.orgΒ·1dΒ·
Discuss: r/homelab
🎯NTLM Attacks
nfc-laboratory: NFC signal and protocol analyzer using SDR receiver
github.comΒ·7hΒ·
⚑Compression Hardware
They're in…now what? How to stop lateral movement when the phish bites
runzero.comΒ·5h
🎫Kerberos Attacks
Detecting DLL hijacking with machine learning: real-world cases
securelist.comΒ·13h
🎫Kerberos Exploitation
Exterro Launches FTK Imager Pro, Unlocking Faster Access To Encrypted Evidence For Investigators Worldwide
forensicfocus.comΒ·12h
πŸ’ΏDAT Forensics
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.toΒ·52mΒ·
Discuss: DEV
🌐NetworkProtocols
Are Software Registries Inherently Insecure?
developers.slashdot.orgΒ·20h
πŸ“¦Container Security
MOSIP, A National Digital Identity Software Solution
ciamweekly.substack.comΒ·7hΒ·
Discuss: Substack
πŸ”PKI Archaeology
AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest
aws.amazon.comΒ·1h
πŸ”HSM Integration