The apocalypse above our heads
aardvark.co.nz·18h
📡RSS
Flag this post
Why Trump hijacked the .gov domain
theverge.com·2d
📡RSS
Flag this post
Simplifying identity security queries with AI
duo.com·1d
🏢LDAP Forensics
Flag this post
Retail cybersecurity statistics for 2025
heimdalsecurity.com·3d
🚨Incident Response
Flag this post
FOSS Weekly #25.45: Rust in Apt, Devuan 6, Modular Router, FSearch, Workspace Mastery and More Linux Stuff
itsfoss.com·1d
🐧FOSS
Flag this post
Ex-Cybersecurity Staff Charged With Moonlighting as Hackers
yro.slashdot.org·2d
🔓Hacking
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
✅Formal Methods
Flag this post
Show HN: Yansu, Serious Coding
🔢Coding Theory
Flag this post
Noise Injection: Improving Out-of-Distribution Generalization for Limited Size Datasets
arxiv.org·5h
🧠Machine Learning
Flag this post
Unauthorized access to Dell CloudLink and Command Monitor possible
heise.de·1d
🔓Hacking
Flag this post
SonicWall pins attack on customer portal to undisclosed nation-state
cyberscoop.com·18h
🎫Kerberos Attacks
Flag this post
Nikkei Suffers Breach Via Slack Compromise
darkreading.com·1d
🔓Hacking
Flag this post
A Criminology of Machines
arxiv.org·1d
🔲Cellular Automata
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
📡Network Protocol Design
Flag this post
Beyond reactive security: why continuous mobile device monitoring is essential
jamf.com·2d
🚨Incident Response
Flag this post
Hackers are teaming up with organized crime gangs to steal cargo right from supply chains
techradar.com·2d
🔓Hacking
Flag this post
Detecting fraudulent North Korean hires: A CISO playbook
news.sophos.com·1d
🎫Kerberos Exploitation
Flag this post
Loading...Loading more...