Autocast: Automatic anycast site optimization
blog.apnic.net·3d
📡BGP Archaeology
A disenshittification moment from the land of mass storage
doctorow.medium.com·16h
🧲Magnetic Philosophy
Product comparison: Detectify vs. Tenable
blog.detectify.com·21h
🎯Threat Hunting
FBI takes down BreachForums portal used for Salesforce extortion
bleepingcomputer.com·2h·
Discuss: Hacker News
🎫Kerberos Exploitation
LINQ and Learning to Be Declarative
nickstambaugh.dev·1d·
Discuss: Hacker News
🔗Concatenative Programming
The effective LLM multi-tenant security with SQL
getbruin.com·1d·
Discuss: Hacker News
🗄️Database Internals
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
tenable.com·16h
🔓Hacking
Speed Matters: How We Achieve the Fastest Web Agent
browser-use.com·1d·
Discuss: Hacker News
🎬WebCodecs
rule-router: I built a high-performance rule engine for NATS in Go
reddit.com·1d·
Discuss: r/golang
🌊Streaming Systems
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🔐Capability Systems
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·15h·
Discuss: Hacker News
🌐Protocol Synthesis
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.org·7h
🔓Hacking
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.org·2d·
Discuss: Hacker News
🔒Language-based security
Writing regex is pure joy. You can't convince me otherwise.
triangulatedexistence.mataroa.blog·1d·
Format Verification
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·1d
🔗Graph Isomorphism
How I found an unauthenticated goldmine of PII
infosecwriteups.com·17h
🔓Hacking
Kubernetes 1.34 Features Explained
scaleops.com·1d·
Discuss: Hacker News
📦Container Security
AI models can acquire backdoors from surprisingly few malicious documents
arstechnica.com·1d
🔓Hacking
Why Self-Host?
romanzipp.com·1d·
Discuss: Hacker News
🏠Personal Archives