011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comΒ·13h
πHash Functions
Flag this post
Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
πFormat Specification
Flag this post
Guide: TLS and QUIC
πDNS over QUIC
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comΒ·5h
π‘οΈeBPF Security
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comΒ·1d
π¦ Parasitic Storage
Flag this post
Oops, My UUIDs Collided
π§ͺBinary Fuzzing
Flag this post
OpenSMTPD 7.8.0p0
bsdsec.netΒ·9h
π‘OpenBSD
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.comΒ·1d
πHacking
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comΒ·1h
πHacking
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comΒ·1d
πQuantum Security
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.ioΒ·1d
πCBOR
Flag this post
IFS Fractal codec
codecs.multimedia.cxΒ·8h
πFractal Compression
Flag this post
Text case changes the size of QR codes
johndcook.comΒ·4h
π±QR Archaeology
Flag this post
Clean Code: Functions and Error Handling in Go: From Chaos to Clarity [Part 1]
hackernoon.comΒ·13h
β
Format Verification
Flag this post
French researchers find major flaws in AI age-verification software for porn
euobserver.comΒ·5h
β
Archive Validation
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comΒ·1d
π¦ Malware Analysis
Flag this post
SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructur...
seclists.orgΒ·1d
π€EBCDIC Privacy
Flag this post
Loading...Loading more...