#16 Pronic, oblong, rectangular numbers.... Etymology and History of Math Terms
pballew.blogspot.com·18h·
λLambda Encodings
Python Security: What is SAST
nocomplexity.com·2d
🕵️Penetration Testing
“Payroll Pirate” phishing scam that takes over Workday accounts steals paychecks
arstechnica.com·1d·
Discuss: r/technews
🎯NTLM Attacks
API Attack Awareness: Injection Attacks in APIs – Old Threat, New Surface
lab.wallarm.com·2d
🔓LDAP Injection
FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.com·1d
🎫Kerberos Exploitation
AAS: The Metric for Monitoring DB Performance
kylehailey.com·22h·
Discuss: Hacker News
🗄️Database Internals
Datastar Response to Allegations
data-star.dev·3h·
Discuss: Hacker News
🏺ZIP Archaeology
The effective LLM multi-tenant security with SQL
getbruin.com·2d·
Discuss: Hacker News
🗄️Database Internals
OpenSSH 10.1/10.1p1 Released
openssh.com·5d·
Discuss: Hacker News
🔐HSM Integration
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
An enough week
blog.mitrichev.ch·2d·
🧮Z3 Solver
Building Luca: An AI Agent for Finance and Accounting Workflows
leapfin.com·7h·
Discuss: Hacker News
🔗Constraint Handling
A small number of samples can poison LLMs of any size
anthropic.com·2d·
🔍Vector Forensics
Analysis of Python Web Development Challenges
dev.to·6h·
Discuss: DEV
🎬WebCodecs API
Enhanced Arc-Fault Current Detection via Dynamic Bayesian Network Inference
dev.to·16h·
Discuss: DEV
🌊Stream Processing
Wireshark 4.6: New functions for encrypted data
heise.de·1d
🕵️Network Forensics
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·2d·
Discuss: Hacker News
🛡️eBPF Security
Buying Verified PayPal,, Account
dev.to·9h·
Discuss: DEV
🔒Hardware Attestation