Lisa Fagin Davis’ “The Materiality of the Voynich Manuscript”…
ciphermysteries.com·9h
🏰Manuscript Networks
DFIR Next Steps: Suspicious Pulseway Use
cybertriage.com·2d
🛡️eBPF Security
Implementing ZADD If Key Exists
rozumem.xyz·1d·
Discuss: Hacker News
Redis Internals
Zero Standing Privilege: Marginal Improvement on the Wrong Paradigm
gluufederation.medium.com·4d·
Discuss: Hacker News
🔐Capability Security
Mastering Docker Bridge Networks: From Beginner to Pro in One Guide
blog.devops.dev·2d
🕸️Mesh Networking
Tony Blair met with Jeffrey Epstein while he was prime minister, new documents reveal
the-independent.com·9h
🌐WARC Forensics
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·1d·
Discuss: Hacker News
🛡️RISC-V Security
Multi-Core By Default
rfleury.com·1d·
🔩Systems Programming
Outdoor ethernet cable (s/ftp vs utp etc)
i.redd.it·2d·
Discuss: r/homelab
🌐Network Protocols
New feature: Complete phone contact history accessible in iOS 26
heise.de·2d
📜Family History Data
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·1d
🎯Threat Hunting
Counterfactual Identifiability via Dynamic Optimal Transport
arxiv.org·1d
🔍Vector Forensics
Multimodal Safety Evaluation in Generative Agent Social Simulations
arxiv.org·1d
🔲Cellular Automata
simonw/claude-skills
simonwillison.net·21h
📄PostScript
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·2d
🔍eBPF
The Engine Room: Deploying to the Cloud with Bedrock Agentcore Runtime
dev.to·2d·
Discuss: DEV
🏠Homelab Orchestration
FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.com·1d
🎫Kerberos Exploitation
Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks
darkreading.com·1d
🔓Hacking
Ethereum-Based Mutuum Finance (MUTM) Records 60% Phase 6 Completion as Funding Surpasses $17M
hackernoon.com·2d
🔍BitFunnel
Show HN: OpenRun – Declarative web app deployment
github.com·5h·
Discuss: Hacker News
🔓Open Source Software