Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1h
🔐Cryptographic Archaeology
Python is adding Zstandard to the standard library in 3.14
discuss.python.org·3h·
Discuss: Hacker News
📚Lempel-Ziv
Fire destroys S. Korean government's cloud storage system, no backups available
dev.to·11h·
Discuss: DEV
💾Persistence Strategies
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·50m
📦Container Security
How we trained an ML model to detect DLL hijacking
securelist.com·5h
🔗Binary Similarity
Are Software Registries Inherently Insecure?
developers.slashdot.org·12h
📦Container Security
Tape Library and Show Off
i.redd.it·14h·
Discuss: r/homelab
📼Cassette Archaeology
Countless security vulnerabilities in Dell PowerProtect Data Domain closed
heise.de·17h
🔓Hacking
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·9h
🔐Capability Systems
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·18h·
Discuss: Hacker News
🛡️WASM Security
Nix pills
nixos.org·1d
❄️Nixpkgs
CVE-2025-61882: Critical 0day in Oracle E-Business Suite exploited in-the-wild
rapid7.com·44m
🔓Hacking
Scribd – A Goldmine of Sensitive Data
medium.com·1d·
Discuss: Hacker News
💣ZIP Vulnerabilities
How we’re securing the AI frontier
blog.google·50m
🎯Threat Hunting
Optimizing a QuickTake Image Decoder for the Apple II’s 6502
hackaday.com·20h
🍎Apple II Heritage
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·1d
🛡Cybersecurity
Red Stone One Carat — TryHackMe Challenge Write-up
infosecwriteups.com·2d
🛡️CLI Security
OpenSSH 10.1/10.1p1 Released
openssh.com·6h·
Discuss: Hacker News
🔐HSM Integration
A content defined chunking algorithm testbed
github.com·2d·
Discuss: Hacker News
🔄Content Deduplication