A disenshittification moment from the land of mass storage
doctorow.medium.com·19h
🧲Magnetic Philosophy
National Cybersecurity Awareness Month: Exorcising the ghosts of forgotten devices
runzero.com·2d
🛡Cybersecurity
Product comparison: Detectify vs. Tenable
blog.detectify.com·23h
🎯Threat Hunting
10 Data + AI Observations for Fall 2025
towardsdatascience.com·17h
🌊Stream Processing
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
krebsonsecurity.com·15h·
Discuss: Hacker News
🌐DNS Security
AI receptionist that answers real phone calls
news.ycombinator.com·13h·
Discuss: Hacker News
🎙️Whisper
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Dozens of Oracle customers impacted by Clop data theft for extortion campaign
cyberscoop.com·1d
🔓Hacking
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.to·10h·
Discuss: DEV
🔤Character Classification
Forensic Focus Digest, October 10 2025
forensicfocus.com·20h
📊Spectrograms
How I Automated My Receipt Tracking (and Stopped Drowning in Paper)
dev.to·20h·
Discuss: DEV
📄Document Digitization
What is Mobile Threat Defense (MTD)?
jamf.com·1d
🎯Threat Hunting
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·2d
🔐Capability Systems
IoT Fails: Production App Hit a Staging API and Exposed Debug Tools
jasonwillems.com·2d·
Discuss: Hacker News
🔤EBCDIC Privacy
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·1d·
Discuss: Hacker News
🌊Stream Processing
Evolution of Apple Security Bounty Program
mjtsai.com·10h
🛡️RISC-V Security
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics
The Importance of Email Security
securityscorecard.com·15h
🎯Threat Hunting
Microsoft warns of 'payroll pirate' crew looting US university salaries
theregister.com·17h
🎯NTLM Attacks