computer security, crazy vulnerabilities
Napster, Kazaa, and the Entrepreneurial Outlaws
brajeshwar.comยท15h
Windows Defender
forums.anandtech.comยท1d
โYou want to talk about a world of lies?โ Teaching philosophy in prison | Jay Miller
theguardian.comยท1d
How to make Windows 11 into a quiet, fast, un-modern desktop
dedoimedo.comยท3h
At Least 15 Million YouTube Videos Have Been Snatched by AI Companies
theatlantic.comยท44m
Walking around the app
veekaybee.github.ioยท1d
Suspected China-linked hackers tried to pose as republican lawmaker, panel says
japantimes.co.jpยท1d
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack
it.slashdot.orgยท1d
ICYMI: Exposure Management Academy on Attack Surface Management, Proactive Security and More
tenable.comยท2d
ActiveState and RL: Unlocking Software Supply Chain Security
reversinglabs.comยท43m
How Hackers Use Google Dorks to Find Secrets
infosecwriteups.comยท4d
Loading...Loading more...