One approach to a curated information diet
📡RSS
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025
bitsight.com·2d
🦠Malware Analysis
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
How I automate my Substack newsletter with content from my blog
simonwillison.net·3d
📰RSS Feed Discovery
Flag this post
Show HN: smtp.js, a drop-in relay to prevent your sites spamming your users
🛡️WASM Security
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·13h
📼Cassette Hacking
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🔤EBCDIC Privacy
Flag this post
Weekly Update 479
troyhunt.com·2h
🔒Privacy Archives
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
Intelligence Insights: November 2025
redcanary.com·2d
🔓Hacking
Flag this post
I’m Joining Privacy Guides
blog.thenewoil.org·15h
🏠Personal Archives
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
🌐WebRTC Archives
Flag this post
Classification of worldwide news articles by perceived quality, 2018-2024
arxiv.org·2d
📰Content Curation
Flag this post
Second-order prompt injection can turn AI into a malicious insider
techradar.com·1d
🎫Kerberos Attacks
Flag this post
KT Corporation's Business Improves, But Security Breach Counsels Caution (Rating Upgrade)
seekingalpha.com·1d
🎫Kerberos Attacks
Flag this post
Notes for November 17-22
taoofmac.com·8h
🌀Brotli Internals
Flag this post
Loading...Loading more...