Top Control of Q4 2025: Penetration Testing
lmgsecurity.com·2d
🕵️Penetration Testing
Flag this post
Reading List 11/8/2025
construction-physics.com·1d
⚙️Cassette Mechanics
Flag this post
Q&A: Sean Zadig of Yahoo on Employing AI in Security
decipher.sc·2d
🎯Threat Hunting
Flag this post
Logo History
🔤Font Archaeology
Flag this post
Lawsuits Allege OpenAI Encouraged Suicide and Harmful Delusions
pxlnv.com·1d
🔓Hacking
Flag this post
Japan Mino Kogyo Ransomware Attack
🌐Network Security
Flag this post
Making Hosted Control Planes possible with Talos
youtube.com·1d
🏠Homelab Federation
Flag this post
Common Crawl Criticized for 'Quietly Funneling Paywalled Articles to AI Developers'
tech.slashdot.org·15h
📰Content Curation
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
🔓Hacking
Flag this post
Cisco: Thousands of Firewalls Vulnerable, New Attack Vectors Observed
heise.de·2d
🌐DNS Security
Flag this post
Spinning Plates
🔩Systems Programming
Flag this post
Tactics to End Dark Patterns in App and Web Development
thenewstack.io·1d
🎨Swedish Design Philosophy
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.org·3d
🔍Vector Forensics
Flag this post
I built a Python tool to quickly evaluate Kubernetes NetworkPolicy security
📦Container Security
Flag this post
'Landfall' Malware Targeted Samsung Galaxy Users
darkreading.com·1d
💿WORM Storage
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·4d
🛡️eBPF Security
Flag this post
Loading...Loading more...