What is Data Exfiltration and How to Prevent It
securityscorecard.com·2d
🕵️Vector Smuggling
I Created a Messenger That Doesn't Send Any Data. Here's How It Works. 💫
dev.to·19h·
Discuss: DEV
🏺Protocol Archaeology
A Practical Guide to Online Privacy
blog.clear-byte.com·1d·
Discuss: Hacker News
🏠Personal Archives
Data Poisoning Attacks
infosecwriteups.com·1d
🔍Vector Forensics
Concerns mount over EU plans to scan private pics for child sexual abuse content
france24.com·13h
🔤EBCDIC Privacy
Why (special agent) Johnny (still) Can't Encrypt (2011)
mattblaze.org·2d·
Discuss: Lobsters
🌊Stream Ciphers
The State of Adversarial Prompts
blog.securitybreak.io·19h
🎯Threat Hunting
Security Affairs newsletter Round 541 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·15h
🔓Hacking
UK's Data Watchdog Warns Students Are Breaching Their Schools' IT Systems
news.slashdot.org·1h
🔓Hacking
OpenAI Model Spec
model-spec.openai.com·1h·
Discuss: Hacker News
🔒WASM Capabilities
Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed
wired.com·1d
🛡Cybersecurity
DF/IR Isn’t About Computers. It’s About Hunting Humans.
brettshavers.com·1d
🔗Data Provenance
The spies of the pharaohs and the double agents of the Caesars: How intelligence services operated in antiquity
english.elpais.com·1d
🗝️Paleocryptography
Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web (2017)
scholarship.law.bu.edu·9h·
Discuss: Hacker News
🌐WARC Forensics
Open Security News week 37-2025
nocomplexity.com·13h
🔓Hacking
Revealing Errors: Errors that reveal the technology around us
revealingerrors.com·8h·
Discuss: Hacker News
🧲Magnetic Philosophy
Cognitive and Gestalt psychology in your code: SMVP pattern
github.com·4h·
Discuss: Hacker News
Format Verification
Where did DNSSEC go wrong?
blog.apnic.net·10h·
Discuss: Hacker News
🌐DNS Security
No Peeking Ahead: Time-Aware Graph Fraud Detection
towardsdatascience.com·13h
🌳Archive Merkle Trees
Keep Reading, Keep Watching
hackaday.com·1d
⚙️Cassette Mechanics