The OSINT playbook: Find your weak spots before attackers do
welivesecurity.comยท2d
๐OSINT Techniques
Flag this post
Hacker Review of Ghost in the Shell (1995)
๐Hacking
Flag this post
RISK ASSESSMENT: POTENTIAL BLOCKS TO THE RELEASE OF THE EPSTEIN FILES
krypt3ia.wordpress.comยท1d
โ๏ธLossy Compression Ethics
Flag this post
Why People Donโt Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info
techdirt.comยท1d
๐งฒMagnetic Philosophy
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท12h
๐ผCassette Hacking
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
the-independent.comยท1d
๐ฆ Parasitic Archives
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.comยท1d
๐คEBCDIC Privacy
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.comยท14h
๐กCybersecurity
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Cryptographic Archaeology
Flag this post
NEWS ROUNDUP โ 21st November 2025
digitalforensicsmagazine.comยท1d
๐จIncident Response
Flag this post
Scientists Teleport Information Between Distant Photons for the First Time
scitechdaily.comยท8h
โ๏ธQuantum Tape
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
๐ Personal Archives
Flag this post
Iโm Joining Privacy Guides
blog.thenewoil.orgยท14h
๐ Personal Archives
Flag this post
๐ Unsupervised Learning NO. 507
newsletter.danielmiessler.comยท3d
๐ต๏ธVector Smuggling
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ญCultural Informatics
Flag this post
Fluid Reconfigurable Intelligent Surface (FRIS) Enabling Secure Wireless Communications
arxiv.orgยท2d
๐Stream Ciphers
Flag this post
Back to security basics: phishing
jamf.comยท2d
๐ซKerberos Attacks
Flag this post
From Shannon to Modern AI: A Complete Information Theory Guide for Machine Learning
machinelearningmastery.comยท2d
๐Entropy Estimation
Flag this post
Loading...Loading more...