Python Program Obfuscation Tool
pixelstech.net·15h
📝Text Compression
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·16h
🌐NetworkProtocols
Flag this post
Modern Perfect Hashing
🧪Binary Fuzzing
Flag this post
Dubious security vulnerability: Denial of service by loading a very large file
devblogs.microsoft.com·6h
💣ZIP Vulnerabilities
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.com·54m
🛡️eBPF Security
Flag this post
Embedding Leak Auditor
🕵️Vector Smuggling
Flag this post
Valuable News – 2025/10/27
vermaden.wordpress.com·9h
🔌Operating system internals
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·9h
🕳️Information Leakage
Flag this post
A Government Data Center
thedailywtf.com·14h
🛡️Preservation Proofs
Flag this post
Attackers can bypass authentication in Dell Storage Manager
heise.de·11h
🔓Hacking
Flag this post
Acting in Self-Defense
cacm.acm.org·5h
🎯Threat Hunting
Flag this post
Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·1d
🛡Cybersecurity
Flag this post
SZI: Tiled Images from ZIP Archives
literarymachin.es·20h
🕸️WebP Analysis
Flag this post
Analyzing Ransomware
🦠Malware Analysis
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.com·22h
🛡️Proof-Carrying Archives
Flag this post
Loading...Loading more...