7-Zip: Attackers Inject Malicious Code
heise.deยท2d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.comยท12hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
This Week in Security: Cloudflare Wasnโ€™t DNS, BADAUDIO, and Not a Vuln
hackaday.comยท1d
๐Ÿ”“Hacking
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Ÿ”Archive Encryption
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.comยท2dยท
๐ŸŒWebRTC Archives
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comยท1d
๐ŸŽฏNTLM Attacks
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Show HN: Hirosend โ€“ Simple Encrypted File Sharing
hirosend.comยท1dยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
Flag this post
eBPF Rootkit
synacktiv.comยท13hยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Flag this post
How to Compress Your Prompts and Reduce LLM Costs
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Text Compression
Flag this post
Langโ€™s theorem โ€” Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.comยท10h
ฮปLambda Encodings
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ŸŽญCultural Informatics
Flag this post
MPEG-2 DCT Recompression FAQ (2003)
forum.doom9.orgยท3dยท
Discuss: Hacker News
โœ…Verification Codecs
Flag this post
Cryptology Group Held an Election, but Canโ€™t Decrypt the Results
nytimes.comยท1dยท
๐Ÿ”Archive Cryptanalysis
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท2d
๐Ÿ”Quantum Security
Flag this post
rpki-client seeks โ‚ฌ300K in funding by 2026 to sustain development
discoverbsd.comยท2d
๐Ÿ”ŒOperating system internals
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท17h
๐ŸŽซKerberos Attacks
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท13h
๐Ÿ“ผCassette Hacking
Flag this post
Recipe 8.6. Picking a Random Line from a File (Perl Cookbook)
csg.sph.umich.eduยท12h
๐Ÿ“Text Compression
Flag this post