FFTY: Spectacular Returns In 2025 Mask Issues
seekingalpha.comยท1d
๐Ÿ”BitFunnel
Prime Portraits
archive.bridgesmathart.orgยท2d
๐Ÿ“Mathematical Art
How Wikimedia Commons is making microbiology open: lessons from Wikimedistas de Jujuy, Argentina
diff.wikimedia.orgยท7h
๐ŸฐManuscript Networks
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.comยท1d
๐Ÿ”NTLM Forensics
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.comยท2d
๐ŸบKerberos Archaeology
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท3d
๐Ÿ“บVT100
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)
isc.sans.eduยท2d
๐Ÿฆ Malware Analysis
Automated Fault Prediction and Residual Lifetime Estimation in Cryogenic Pumps via Dynamic Bayesian Network (DBN)
dev.toยท6hยท
Discuss: DEV
๐Ÿ“ŠQuantization
A new breed of analyzers
daniel.haxx.seยท1dยท
๐Ÿ›Fuzzing
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.comยท1d
๐ŸบKerberos Archaeology
Statistics in the Era of AI
scienceforeveryone.scienceยท1dยท
Discuss: Hacker News
๐ŸŽ“Academic Torrents
Forensic Focus Digest, October 10 2025
forensicfocus.comยท1d
๐ŸšจIncident Response
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธRISC-V Security
๐Ÿผ Pandas DataFrame Selection, Filtering & Cleaning โ€” Hands-on Practice.
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Linear Algebra
SSH Security: Why You Should Touch to Verify
ubicloud.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Kurzgesagt - In a Nutshell: AI Slop Is Destroying The Internet
dev.toยท8hยท
Discuss: DEV
๐Ÿ“ฐContent Curation
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation