The apocalypse above our heads
aardvark.co.nz·18h
📡RSS
Flag this post
Why Trump hijacked the .gov domain
theverge.com·2d
📡RSS
Flag this post
Simplifying identity security queries with AI
duo.com·1d
🏢LDAP Forensics
Flag this post
Retail cybersecurity statistics for 2025
heimdalsecurity.com·3d
🚨Incident Response
Flag this post
FOSS Weekly #25.45: Rust in Apt, Devuan 6, Modular Router, FSearch, Workspace Mastery and More Linux Stuff
itsfoss.com·1d
🐧FOSS
Flag this post
Ex-Cybersecurity Staff Charged With Moonlighting as Hackers
yro.slashdot.org·2d
🔓Hacking
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
kumi-play-web.fly.dev·1d·
Discuss: Hacker News
Formal Methods
Flag this post
Show HN: Yansu, Serious Coding
twitter.com·1d·
Discuss: Hacker News
🔢Coding Theory
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.info·1d·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Noise Injection: Improving Out-of-Distribution Generalization for Limited Size Datasets
arxiv.org·5h
🧠Machine Learning
Flag this post
Unauthorized access to Dell CloudLink and Command Monitor possible
heise.de·1d
🔓Hacking
Flag this post
Facade Pattern — Catalog of Enterprise Application Architecture Patterns 🏢
dev.to·5h·
Discuss: DEV
🔐CBOR
Flag this post
SonicWall pins attack on customer portal to undisclosed nation-state
cyberscoop.com·18h
🎫Kerberos Attacks
Flag this post
Nikkei Suffers Breach Via Slack Compromise
darkreading.com·1d
🔓Hacking
Flag this post
A Criminology of Machines
arxiv.org·1d
🔲Cellular Automata
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.org·1d·
Discuss: Hacker News
📡Network Protocol Design
Flag this post
Beyond reactive security: why continuous mobile device monitoring is essential
jamf.com·2d
🚨Incident Response
Flag this post
Hackers are teaming up with organized crime gangs to steal cargo right from supply chains
techradar.com·2d
🔓Hacking
Flag this post
US-Based Photographer’s Website Hacked Due to Nulled Theme: Phemight Technologies Issues Security Warning
dev.to·1d·
Discuss: DEV
🔓Hacking
Flag this post
Detecting fraudulent North Korean hires: A CISO playbook
news.sophos.com·1d
🎫Kerberos Exploitation
Flag this post