A new measure for dynamic leakage based on quantitative information flow
arxiv.org·58m
🔒Language-based security
Flag this post
Embedding Leak Auditor
🕵️Vector Smuggling
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·1h
🎫Kerberos Exploitation
Flag this post
Could you be a traitor? Psychologist reveals how to lie and get away with it
the-independent.com·19h
🎯Threat Hunting
Flag this post
Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·1d
🛡Cybersecurity
Flag this post
Too Many Secrets: Attackers Pounce on Sensitive Data Sprawl
darkreading.com·4d
🔓Hacking
Flag this post
Collins Aerospace: Old Passwords and Delayed Response Enable Data Theft
heise.de·9h
🔓Hacking
Flag this post
Rationalizable Screening and Disclosure under Unawareness
arxiv.org·58m
🛡️Differential Privacy
Flag this post
Security Logs to ATT&CK Insights: Leveraging LLMs for High-Level Threat Understanding and Cognitive Trait Inference
arxiv.org·58m
🎯Threat Hunting
Flag this post
Risky Bulletin: Russian bill would require researchers to report bugs to the FSB
news.risky.biz·3h
🔓Hacking
Flag this post
Title: North Korean Spies Infiltrate Hundreds of Companies Using Deepfake Technology
🕵️Steganography
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.com·6h
🛡️Proof-Carrying Archives
Flag this post
Information Power!
cacm.acm.org·4d
🧲Magnetic Philosophy
Flag this post
Design from the Margins
🎨Nordic Design
Flag this post
A moonlit week
λLambda Encodings
Flag this post
VOA : mini secrets manager
🚀Indie Hacking
Flag this post
How I Used Smart Glasses to Trick a Bartender Into Giving Me a Free Drink
lifehacker.com·2d
📼Cassette Hacking
Flag this post
Loading...Loading more...