BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·2d
🔐Archive Encryption
Flag this post
Even the easiest data requests can require some effort
statmodeling.stat.columbia.edu·1d
🎓Academic Torrents
Flag this post
The strange webserver hot potato — sending file descriptors
blog.habets.se·1d
📞WebRTC
Flag this post
Cybersecurity experts warn real-time voice deepfakes are here
techspot.com·1d·
Discuss: r/technews
🕵️Vector Smuggling
Flag this post
The next legal frontier is your face and AI
theverge.com·1d
🗜️LZW Variants
Flag this post
Shifting from reactive to proactive: Cyber resilience amid nation-state espionage
cyberscoop.com·3d
🎯Threat Hunting
Flag this post
Weekly Update 475
troyhunt.com·1d
🏺Kerberos Archaeology
Flag this post
Design for Learning
kris.pengy.ca·16h·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
UN Cybercrime Treaty wins dozens of signatories, to go with its many critics
theregister.com·8h·
Discuss: Hacker News
🇸🇪Nordic Cryptography
Flag this post
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
malwaretech.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
Schneier on LLM vulnerabilities, agentic AI, and "trusting trust"
herbsutter.com·3d·
Discuss: Hacker News
🧪Protocol Fuzzing
Flag this post
Go Concurrency Mastery: Preventing Goroutine Leaks with Context, Timeout & Cancellation Best Practices
dev.to·18h·
Discuss: DEV
🌊Stream Processing
Flag this post
MCP Guardrails: Mitigating Data Poisoning and Prompt Injection in AI Coding Assistants
dev.to·3d·
Discuss: DEV
🌐DNS Security
Flag this post
Kernel_lockdown(7) – Linux Manual Page
man7.org·1d·
Discuss: Hacker News
🔌Operating system internals
Flag this post
Surveillance: Civil society warns against signing the Cybercrime Convention
heise.de·17h
🛡Cybersecurity
Flag this post
CXRAgent: Director-Orchestrated Multi-Stage Reasoning for Chest X-Ray Interpretation
arxiv.org·8h
Proof Automation
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·8h
🧮Algebraic Datatypes
Flag this post
Habits of Highly Mathematical People
medium.com·9h·
Discuss: Hacker News
⚔️Lean Theorem
Flag this post
Excision Score: Evaluating Edits with Surgical Precision
arxiv.org·8h
⛏️File Carving
Flag this post
Ken Thompson's "Trusting Trust" compiler backdoor - Now with the actual source code (2023)
micahkepe.com·2d·
💻Programming languages
Flag this post