Acting in Self-Defense
cacm.acm.org·8h
🎯Threat Hunting
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.com·1d
🛡️Proof-Carrying Archives
Flag this post
Release Highlights: VMRay Platform 2025.4.0
vmray.com·3d
🏺ZIP Archaeology
Flag this post
Analyzing Ransomware
🦠Malware Analysis
Flag this post
Swift Sings: MDX-Net Vocal Splits and RVC Voice Conversion On-Device with ONNX/CoreML
web.navan.dev·1d
🎧Learned Audio
Flag this post
Writing a competitive BZip2 encoder in Ada from scratch in a few days - part 4: programming
📦Deflate
Flag this post
Paillier Cryptosystem
🔐Homomorphic Encryption
Flag this post
NEWS ROUNDUP – 27th October 2025
digitalforensicsmagazine.com·15h
🌐DNS Security
Flag this post
Checklist: Securely Using a Python Program
nocomplexity.com·8h
🛡️CLI Security
Flag this post
Windows 11 is getting a new trick to make your PC more reliable – and Microsoft has fixed a security flaw in File Explorer
techradar.com·2h
🖥️Modern Terminals
Flag this post
The art and science of effective security storytelling
redcanary.com·10h
🔗Data Provenance
Flag this post
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
💣ZIP Vulnerabilities
Flag this post
Inside the Data Centers That Train A.I. and Drain the Electrical Grid
newyorker.com·13h
🖥️Modern Terminals
Flag this post
Internet measurement, resilience, and transparency: a week of stories from Cloudflare Research and friends
blog.cloudflare.com·11h
🕸️Mesh Networking
Flag this post
VOA : mini secrets manager
🚀Indie Hacking
Flag this post
OpenTelemetry Collector: The Backbone of Modern Observability Pipelines
blog.devops.dev·10h
👁️System Observability
Flag this post
Loading...Loading more...