The OSINT playbook: Find your weak spots before attackers do
welivesecurity.comยท2d
๐Ÿ”ŽOSINT Techniques
Flag this post
Hacker Review of Ghost in the Shell (1995)
hackerfiction.netยท13hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.toยท15hยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
Flag this post
RISK ASSESSMENT: POTENTIAL BLOCKS TO THE RELEASE OF THE EPSTEIN FILES
krypt3ia.wordpress.comยท1d
โš–๏ธLossy Compression Ethics
Flag this post
Why People Donโ€™t Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info
techdirt.comยท1d
๐ŸงฒMagnetic Philosophy
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท12h
๐Ÿ“ผCassette Hacking
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
the-independent.comยท1d
๐Ÿฆ Parasitic Archives
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.comยท1d
๐Ÿ”คEBCDIC Privacy
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.comยท14h
๐Ÿ›กCybersecurity
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
NEWS ROUNDUP โ€“ 21st November 2025
digitalforensicsmagazine.comยท1d
๐ŸšจIncident Response
Flag this post
Scientists Teleport Information Between Distant Photons for the First Time
scitechdaily.comยท8h
โš›๏ธQuantum Tape
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
fastercapital.comยท9hยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post
Iโ€™m Joining Privacy Guides
blog.thenewoil.orgยท14h
๐Ÿ Personal Archives
Flag this post
US Border Patrol Is Spying on Millions of American Drivers
wired.comยท18hยท
Discuss: Hacker News
๐Ÿ•ต๏ธNetwork Forensics
Flag this post
๐Ÿ“˜ Unsupervised Learning NO. 507
newsletter.danielmiessler.comยท3d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ŸŽญCultural Informatics
Flag this post
Fluid Reconfigurable Intelligent Surface (FRIS) Enabling Secure Wireless Communications
arxiv.orgยท2d
๐ŸŒŠStream Ciphers
Flag this post
Back to security basics: phishing
jamf.comยท2d
๐ŸŽซKerberos Attacks
Flag this post
From Shannon to Modern AI: A Complete Information Theory Guide for Machine Learning
machinelearningmastery.comยท2d
๐Ÿ“ˆEntropy Estimation
Flag this post