Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·35m
🇸🇪Swedish Cryptanalysis
OpenSSH 10.2 Released with Key Bugfix for ControlPersist Issue
linuxiac.com·1d
🔐HSM Integration
How to find Ivanti Endpoint Manager installations on your network
runzero.com·14h
🔓Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·19h
🌐DNS Security
Python 3.12.12, 3.11.14, 3.10.19 and 3.9.24 are now available!
pythoninsider.blogspot.com·1d
🔍Z3 Parsing
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.com·2d·
🔑Cryptographic Protocols
Quantum-Aware Federated Learning for Open QaaS Platform Validation
dev.to·1d·
Discuss: DEV
⚛️Quantum Compilers
Cache smuggling: When a picture isn't a thousand words
expel.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·2d
🔐Capability Systems
Buy BitMart (BMX) at the best price 100% guaranteed
dev.to·13h·
Discuss: DEV
Format Validation
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.to·13h·
Discuss: DEV
🔤Character Classification
Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)
dev.to·15h·
Discuss: DEV
🌳Archive Merkle Trees
PHP's New URI Extension
thephp.foundation·22h·
Discuss: Hacker News
🌐Web Standards
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Running new applications on old glibc
lightofdawn.org·2d·
Discuss: Hacker News
🔗Static Linking
Memgoose – An In-Memory Mongoose Impersonator
github.com·52m·
Discuss: Hacker News
🔄Sync Engine
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·43m·
Discuss: Hacker News
🔗Data Provenance
Cybersecurity Awareness Month - 4 Key Tactics to Prevent Phishing
cofense.com·3d
🎯Threat Hunting
How to Enable SFTP Without Shell Access on Ubuntu
digitalocean.com·4h·
Discuss: Hacker News
🛡️CLI Security
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems