Some Notes from RIPE-91
potaroo.netยท3d
๐ŸŒDNS over QUIC
Flag this post
Preparing DNSSEC for the Post-Quantum Era
circleid.comยท3d
๐ŸŒDNS over QUIC
Flag this post
NEWS ROUNDUP โ€“ 31st October 2025
digitalforensicsmagazine.comยท16h
๐Ÿ›กCybersecurity
Flag this post
Fungus: The Befunge CPU(2015)
bedroomlan.orgยท1hยท
Discuss: Hacker News
โšกHomebrew CPUs
Flag this post
Metasploit Wrap-Up 10/31/2025
rapid7.comยท8h
๐Ÿ›ก๏ธCLI Security
Flag this post
How to find DNN Software installations on your network
runzero.comยท10h
๐Ÿ›ก๏ธSecurity Headers
Flag this post
Punching Holes into Firewalls
sebsauvage.netยท1dยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐ŸŒณArchive Merkle Trees
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท17h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Tricks, Treats, and Terabits
hackerfactor.comยท1dยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท9h
๐Ÿ”“Hacking
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.comยท1d
๐Ÿ“ฆContainer Security
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท18h
๐Ÿ›ก๏ธeBPF Security
Flag this post
BGP โ€“ The Guy Who Knows Every Shortcut on the Internet
blog.aarjun.techยท23hยท
Discuss: DEV, Hacker News
๐Ÿ“กBGP Archaeology
Flag this post
Cloudflare with Edward Wang & Kevin Guthrie
corrode.devยท1dยท
Discuss: r/rust
๐Ÿ”’Linear Types
Flag this post
The researcherโ€™s desk: CVE-2025-20362
blog.detectify.comยท14h
๐Ÿ”“Hacking
Flag this post
Health insurance company tries reverse domain name hijacking
domainnamewire.comยท10hยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.comยท1dยท
Discuss: Substack
๐ŸงชBinary Fuzzing
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.comยท1d
๐Ÿ”“Hacking
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท23h
๐Ÿ”’Language-based security
Flag this post