Cut the Noise, Keep the Signal: The Hidden Cost of Duplicate Reports
hackerone.com·1d
Archive Fixity
Flag this post
Rivian’s onboard cameras save owner from a false accusation by police
electrek.co·13h·
Discuss: Hacker News
🔍Tape Forensics
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.com·18h
🔗Binary Similarity
Flag this post
Extropic claims its new AI chip (TSU) is 10,000x more energy-efficient than GPUs
extropic.ai·20h·
Discuss: Hacker News
Homebrew CPUs
Flag this post
Demonstrating a Rollback Attack on a Honda via HackRF Portapack and an Aftermarket Security Solution
rtl-sdr.com·9h
📻Homebrew Protocols
Flag this post
Everything You Need to Know About Ingress Protection Ratings and Making Tech Weatherproof
popularmechanics.com·20h
🔒Hardware Attestation
Flag this post
Scalable Phase-Change Memory Array Reliability Prediction via Bayesian Neural Networks
dev.to·1h·
Discuss: DEV
Cache Coherence
Flag this post
1130MRAM smoking gun found
rescue1130.blogspot.com·2d·
Circuit Archaeology
Flag this post
Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.com·16h
🔧RISC-V Assembler
Flag this post
A hitchhiker's guide to CUDA programming
seanzhang.me·13h·
Discuss: Hacker News
SIMD Vectorization
Flag this post
Notes from RIPE 91
blog.apnic.net·10h
🌐DNS over QUIC
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.com·1d
🎯Threat Hunting
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.com·1d
🔍Audio Forensics
Flag this post
The Invention of the Transient Designer
elysia.com·9h·
Discuss: Hacker News
🎛️Audio Synthesis
Flag this post
Vibe coding needs a spec, too
stackoverflow.blog·2h
🔌Interface Evolution
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·1d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
NEWS ROUNDUP – 29th October 2025
digitalforensicsmagazine.com·2d
🚨Incident Response
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·22h
🦠Parasitic Storage
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·1d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post