Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan
dev.toยท1hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.comยท2d
๐Ÿ”ŽOSINT Techniques
Flag this post
Hacker Review of Ghost in the Shell (1995)
hackerfiction.netยท14hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.comยท13h
๐Ÿ“ผCassette Hacking
Flag this post
RISK ASSESSMENT: POTENTIAL BLOCKS TO THE RELEASE OF THE EPSTEIN FILES
krypt3ia.wordpress.comยท1d
โš–๏ธLossy Compression Ethics
Flag this post
Why People Donโ€™t Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info
techdirt.comยท1d
๐ŸงฒMagnetic Philosophy
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
the-independent.comยท1d
๐Ÿฆ Parasitic Archives
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.comยท1d
๐Ÿ”คEBCDIC Privacy
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.comยท1d
๐Ÿ”Cryptographic Archaeology
Flag this post
Best infosec-related long reads for the week of 11/15/25
metacurity.comยท16h
๐Ÿ›กCybersecurity
Flag this post
NEWS ROUNDUP โ€“ 21st November 2025
digitalforensicsmagazine.comยท1d
๐ŸšจIncident Response
Flag this post
Scientists Teleport Information Between Distant Photons for the First Time
scitechdaily.comยท9h
โš›๏ธQuantum Tape
Flag this post
Circular Transactions: The Complex Loopholes of Abusive Tax Shelters
fastercapital.comยท10hยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post
๐Ÿ“˜ Unsupervised Learning NO. 507
newsletter.danielmiessler.comยท3d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
US Border Patrol Is Spying on Millions of American Drivers
wired.comยท19hยท
Discuss: Hacker News
๐Ÿ•ต๏ธNetwork Forensics
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ŸŽญCultural Informatics
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.toยท16hยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
Flag this post
Iโ€™m Joining Privacy Guides
blog.thenewoil.orgยท15h
๐Ÿ Personal Archives
Flag this post
Back to security basics: phishing
jamf.comยท2d
๐ŸŽซKerberos Attacks
Flag this post
From Shannon to Modern AI: A Complete Information Theory Guide for Machine Learning
machinelearningmastery.comยท2d
๐Ÿ“ˆEntropy Estimation
Flag this post