Oops, My UUIDs Collided
alexsci.comยท4hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ฒLattice Cryptography
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท15h
๐Ÿ”Hash Functions
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Cryptanalysis
Flag this post
Registry Analysis
windowsir.blogspot.comยท9hยท
๐Ÿ”NTLM Archaeology
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Ÿ”“Decompilation
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท5h
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.comยท3hยท
๐Ÿ—‚Data structures
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
My first fifteen compilers (2019)
blog.sigplan.orgยท2hยท
Discuss: Hacker News
๐Ÿ—๏ธCompiler Archaeology
Flag this post
How to Hack a Poker Game
wired.comยท13h
๐Ÿ“ผCassette Hacking
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.comยท2h
๐Ÿ”“Hacking
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
The internet was made for privacy
doctorow.medium.comยท6h
๐ŸงฒMagnetic Philosophy
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท1d
๐ŸŒBGP Security
Flag this post