Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·13h
🇸🇪Swedish Cryptanalysis
#16 Pronic, oblong, rectangular numbers.... Etymology and History of Math Terms
pballew.blogspot.com·16h·
λLambda Encodings
OpenSSH 10.2 Released with Key Bugfix for ControlPersist Issue
linuxiac.com·1d
🔐HSM Integration
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·1d
🌐DNS Security
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·2d
🔐Capability Systems
Cybersecurity Awareness Month - 4 Key Tactics to Prevent Phishing
cofense.com·3d
🎯Threat Hunting
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·13h·
Discuss: Hacker News
🔗Data Provenance
Context Engineering for Coding Agents
hackernoon.com·19h
🌳Incremental Parsing
Polymorphic Python Malware, (Wed, Oct 8th)
isc.sans.edu·3d
🔓Hacking
Hardening SSH with Touch-Verified Hardware Keys
ubicloud.com·2d·
Discuss: Hacker News
🔒Hardware Attestation
Hacking a Game Boy Emulator to Output MIDI to Multiple Hardware Synths
dr-schlange.github.io·2h·
Discuss: Hacker News
🎮Gameboy Emulation
Slip – A Lisp System in JavaScript
lisperator.net·1d·
Discuss: Hacker News
🔗Lisp
Practical Guide to Production-Grade Observability in the JS ecosystem
medium.com·6h
👁️System Observability
Cybercrime ring GXC Team dismantled in Spain, 25-year-old leader detained
securityaffairs.com·4h
🔓Hacking
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·1d·
Discuss: Hacker News
🌐Protocol Synthesis
Prompt Injection 2.0: The New Frontier of AI Attacks
dev.to·2h·
Discuss: DEV
🎯Threat Hunting
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.com·4d·
💿ZFS Internals
Love C, Hate C: Web Framework Memory Problems
alew.is·1d·
Discuss: Hacker News
🔩Systems Programming
Memgoose – An In-Memory Mongoose Impersonator
github.com·13h·
Discuss: Hacker News
🔄Sync Engine