GDPR Compatibility, Mainframe Compliance, Character Set Rights, Legacy Regulations

Modern Perfect Hashing
blog.sesse.net·2h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Millions of passengers possibly affected by cyber breach at Dublin Airport supplier
techradar.com·3h
🛡Cybersecurity
Flag this post
InnoGate: Anti-Piracy Research Discovery Platform with AI-Powered RAG and Auth0 FGA
dev.to·8h·
Discuss: DEV
🔌Archive APIs
Flag this post
27th October – Threat Intelligence Report
research.checkpoint.com·4h
🛡Cybersecurity
Flag this post
BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·2d
🔐Archive Encryption
Flag this post
Let's Help NetBSD Cross the Finish Line Before 2025 Ends
discoverbsd.com·5h
🔌Operating system internals
Flag this post
Analysis by Claude of Mt. Gox's 2011 codebase
github.com·13h·
Discuss: Hacker News
🧬PostgreSQL Forensics
Flag this post
Phishing scam uses fake death notices to trick LastPass users
malwarebytes.com·55m
🎯NTLM Attacks
Flag this post
Learning osquery
blog.devops.dev·2h
🔌Operating system internals
Flag this post
The art and science of effective security storytelling
redcanary.com·2h
🔗Data Provenance
Flag this post
Risky Bulletin: Russian bill would require researchers to report bugs to the FSB
news.risky.biz·13h
🔓Hacking
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·12h
🎫Kerberos Exploitation
Flag this post
Distroless Containers for Corporate Use: Nix Flakes vs. Fedora
blog.riemann.cc·22h·
❄️Nix Adoption
Flag this post
Bytes over DNS, (Mon, Oct 27th)
isc.sans.edu·6h
🌐DNS Security
Flag this post
How to Measure a Company’s Cyber Risk with the Breach Susceptibility Indicator
securityscorecard.com·2h
🎯Threat Hunting
Flag this post
What does computer literacy mean for 2026?
sjg.io·1h·
Discuss: Hacker News
🧠Personal Knowledge Base
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·4h
🕳️Information Leakage
Flag this post
Attackers can bypass authentication in Dell Storage Manager
heise.de·5h
🔓Hacking
Flag this post
Linux variant of Qilin Ransomware targets Windows via remote management tools and BYOVD
securityaffairs.com·4h
🎫Kerberos Exploitation
Flag this post