Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·9h
🇸🇪Swedish Cryptanalysis
OpenSSH 10.2 Released with Key Bugfix for ControlPersist Issue
linuxiac.com·1d
🔐HSM Integration
How to find Ivanti Endpoint Manager installations on your network
runzero.com·23h
🔓Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·1d
🌐DNS Security
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·2d
🔐Capability Systems
Cybersecurity Awareness Month - 4 Key Tactics to Prevent Phishing
cofense.com·3d
🎯Threat Hunting
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.io·1d·
🔓Open Source Software
My BTL1 Review
infosecwriteups.com·1d
🔐Certificate Analysis
A small number of samples can poison LLMs of any size
anthropic.com·2d·
🔍Vector Forensics
Building a Universal Webhook Adapter in Go: Introducing WHOOK
dev.to·1d·
Discuss: DEV
🌐WASI
When Will Quantum Computing Work?
tommccarthy.net·1d·
Discuss: Hacker News
🔐Quantum Security
Defeating Return Type Polymorphism
philipphagenlocher.de·2d·
Discuss: Hacker News
🧬Functional Programming
Complete Guide to Audio Processing in Python: From Spectrograms to Real-Time Applications
dev.to·6h·
Discuss: DEV
📊Spectral Analysis
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·2d·
🧮Algebraic Datatypes
Polymorphic Python Malware, (Wed, Oct 8th)
isc.sans.edu·3d
🔓Hacking
Context Engineering for Coding Agents
hackernoon.com·16h
🌳Incremental Parsing
Hardening SSH with Touch-Verified Hardware Keys
ubicloud.com·2d·
Discuss: Hacker News
🔒Hardware Attestation
Slip – A Lisp System in JavaScript
lisperator.net·1d·
Discuss: Hacker News
🔗Lisp