A private jet and massive debt - the rise and fall of a £1m Glastonbury ticket scammer
bbc.com·2h
🎫Kerberos Attacks
Flag this post
Distributed Tracing in Go: Finding the Needle in the Microservice Haystack
👁️Observatory Systems
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.com·1d
🔤EBCDIC Privacy
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·14h
📼Cassette Hacking
Flag this post
Security Is Fragmenting and Converging at the Same Time — Insights from the Field
raffy.ch·1d
❄️Nix Adoption
Flag this post
The web's infrastructure has a concentration problem, exposing us all to crushing outages — from AWS and Azure to Cloudflare, the perils of having a centralized...
tomshardware.com·1d
🕸️Mesh Networks
Flag this post
How To Build a Graph-Based Recommendation Engine Using EDG and Neo4j
towardsdatascience.com·1d
🕸️Neo4j
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
📄Text Chunking
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
Built Bittorrent in go
🌊BitTorrent
Flag this post
Reading List 11/22/25
construction-physics.com·19h
🌡️Preservation Physics
Flag this post
No Key, Mo Problems
🔗Hash Chains
Flag this post
Olmo 3 is a fully open LLM
simonwillison.net·8h
🌀Brotli Internals
Flag this post
Mastering Azure Load Balancing with Virtual Machines
blog.devops.dev·1d
🏠Homelab Federation
Flag this post
Request For Comments: A secure contact import scheme for social networks
🔐Homomorphic Encryption
Flag this post
Loading...Loading more...