The internet was made for privacy
doctorow.medium.com·6h
🧲Magnetic Philosophy
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·18h
🔒Language-based security
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·12h
🕵️Vector Smuggling
Flag this post
The Great Firewall Part 1: The Dump
📡DNS Archaeology
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.com·2h
🔓Hacking
Flag this post
Chelsea Manning, former intelligence analyst: “If someone were to publish a massive leak today, people would say ‘oh this isn’t true’”
english.elpais.com·7h
🔓Hacking
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·7h
🛡️eBPF Security
Flag this post
Privacy Risks of 1x Neo Robot
🏠Home Automation
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers
bastille.net·3d
🕸️Mesh Networking
Flag this post
Everyone Wants to Hack — No One Wants to Think
infosecwriteups.com·15h
🔓Hacking
Flag this post
Cyber's Role in the Rapid Rise of Digital Authoritarianism
darkreading.com·13h
🔓Hacking
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.com·1d
🔗Binary Similarity
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·5h
🔓Hacking
Flag this post
Security Doesn’t Have to Hurt
docker.com·9h
🔐Capability Security
Flag this post
Hackers threaten to leak ‘woke’ University of Pennsylvania student data
theverge.com·4h
🔓Hacking
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·1d
🌐BGP Security
Flag this post
Once Again, Chat Control Flails After Strong Public Pressure
eff.org·1h
📡Feed Security
Flag this post
Oops, My UUIDs Collided
🧪Binary Fuzzing
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.com·1d
🔐Quantum Security
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·1d
🕵️Steganographic Archives
Flag this post
Loading...Loading more...