Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·5h
🇸🇪Swedish Cryptanalysis
OpenSSH 10.2 Released with Key Bugfix for ControlPersist Issue
linuxiac.com·1d
🔐HSM Integration
How to find Ivanti Endpoint Manager installations on your network
runzero.com·19h
🔓Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·1d
🌐DNS Security
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·2d
🔐Capability Systems
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·5h·
Discuss: Hacker News
🔗Data Provenance
Cybersecurity Awareness Month - 4 Key Tactics to Prevent Phishing
cofense.com·3d
🎯Threat Hunting
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Free online password generator – simple, customizable, and privacy-conscious
pasgen.online·4d·
Discuss: Hacker News
🔓Password Cracking
Source of Truth Update – Friday, October 10, 2025
rubycentral.org·2h·
Discuss: Hacker News
Archive Fixity
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.to·11h·
Discuss: DEV
🔗Supply Chain
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.io·1d·
🔓Open Source Software
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·2d·
🧮Algebraic Datatypes
My BTL1 Review
infosecwriteups.com·1d
🔐Certificate Analysis
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics
Building a Universal Webhook Adapter in Go: Introducing WHOOK
dev.to·22h·
Discuss: DEV
🌐WASI