Oops, My UUIDs Collided
๐งชBinary Fuzzing
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
๐ฒLattice Cryptography
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท15h
๐Hash Functions
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐ก๏ธeBPF Security
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐ฆ Malware Analysis
Flag this post
Registry Analysis
๐NTLM Archaeology
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐ต๏ธVector Smuggling
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Decompilation
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท5h
๐ด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Hacking
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Hacking
Flag this post
The Structure of Data
๐Data structures
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐DNS over QUIC
Flag this post
How to Hack a Poker Game
wired.comยท13h
๐ผCassette Hacking
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.comยท2h
๐Hacking
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐DNS Security
Flag this post
The internet was made for privacy
doctorow.medium.comยท6h
๐งฒMagnetic Philosophy
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท1d
๐BGP Security
Flag this post
Loading...Loading more...