011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
Oops, My UUIDs Collided
alexsci.comยท1hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
dev.toยท5hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Attackers dig up $11M in Garden Finance crypto exploit
theregister.comยท6h
๐ŸŒณArchive Merkle Trees
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท1d
๐Ÿ”Quantum Security
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.mediaยท3hยท
Discuss: Hacker News
๐Ÿ”—Blockchain Archives
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท1h
๐Ÿ”“Hacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.comยท23h
๐Ÿ”“Hacking
Flag this post
Why and how Bitcoin uses Merkle trees
johndcook.comยท3dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
Technology Short Take 189
blog.scottlowe.orgยท7h
๐Ÿ Homelab Archaeology
Flag this post
EthVault: A Secure and Resource-Conscious FPGA-Based Ethereum Cold Wallet
arxiv.orgยท2d
๐ŸŒŠStream Ciphers
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.ioยท1d
๐Ÿ”CBOR
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท22h
๐ŸŒณArchive Merkle Trees
Flag this post
Notes from RIPE 91
blog.apnic.netยท21h
๐ŸŒDNS over QUIC
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท1d
๐Ÿ”—Binary Similarity
Flag this post
Vulnerability Analysis: Deconstructing the $147k Sharwa Finance Exploit
blog.verichains.ioยท1d
๐ŸŽซKerberos Attacks
Flag this post