Back to security basics: phishing
jamf.com·2d
🎫Kerberos Attacks
Flag this post
[REVIVE-SA-2025-004] Revive Adserver Vulnerabilities
seclists.org·3d
🎫Kerberos Exploitation
Flag this post
Integrity Policy - Monitoring and Enforcing the use of SRI
scotthelme.ghost.io·3d
🚀Indie Hacking
Flag this post
Data Exfiltration in Claude for Excel
🔓Hacking
Flag this post
Minimal CLI web security scanner
🛡️Security Headers
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
🔗Dependency Resolution
Flag this post
Joy & Curiosity #63
registerspill.thorstenball.com·58m
🌀Brotli Internals
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
The One Algorithm That Makes Distributed Systems Stop Falling Apart When the Leader Dies
🤝Consensus Protocols
Flag this post
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
🧪CBOR Fuzzing
Flag this post
Data Science Quiz For Humanities
codingthepast.com·1d
🧪Data science
Flag this post
Let me opt in, not out
🛡️WASM Sandboxing
Flag this post
Loading...Loading more...