Best infosec-related long reads for the week of 10/18/25
metacurity.com·2d
🛡Cybersecurity
Flag this post
How the CIA’s Kryptos Sculpture Gave Up Its Final Secret
scientificamerican.com·5d
🔐Cryptographic Archaeology
Flag this post
Shadow IT: The Haunting Inside Your Network
bitsight.com·3d
🔓Hacking
Flag this post
Beyond Benchmarks: Testing Open-Source LLMs in Multi-Agent Workflows
blog.scottlogic.com·19h
Performance Mythology
Flag this post
Hacking Team successor linked to malware campaign, new ‘Dante’ commercial spyware
cyberscoop.com·2h
🎫Kerberos Exploitation
Flag this post
Hiding Processes from Ps or Top
rtvkiz.vercel.app·3d·
Discuss: Hacker News
📟Terminal Forensics
Flag this post
Today the Tech Industry Is the Oil Industry in a Hoodie
chrisbako.com·2h·
Discuss: Hacker News
🖥️Terminal Renaissance
Flag this post
Using a Security Key on X? Re-Enroll Now or Your Account Will Be Locked
pcmag.com·2h·
Discuss: Hacker News
🔓Password Cracking
Flag this post
Understanding AI Trustworthiness: A Scoping Review of AIES & FAccT Articles
arxiv.org·15h
🤖AI Curation
Flag this post
Dynamic Collaborative Workspace Optimization via Adaptive Hyperparameter Tuning and Bayesian Reinforcement Learning
dev.to·2h·
Discuss: DEV
🌊Stream Processing
Flag this post
Go Concurrency Mastery: Preventing Goroutine Leaks with Context, Timeout & Cancellation Best Practices
dev.to·1d·
Discuss: DEV
🌊Stream Processing
Flag this post
MCP Guardrails: Mitigating Data Poisoning and Prompt Injection in AI Coding Assistants
dev.to·3d·
Discuss: DEV
🌐DNS Security
Flag this post
Visibility at scale: How Figma detects sensitive data exposure
figma.com·4d·
Discuss: Hacker News
🌊Stream Processing
Flag this post
X says passkey reset isn't about a security issue – it's to finally kill off twitter.com
theregister.com·6h
🎯NTLM Attacks
Flag this post
Internet measurement, resilience, and transparency: a week of stories from Cloudflare Research and friends
blog.cloudflare.com·7h
🕸️Mesh Networking
Flag this post
Surveillance: Civil society warns against signing the Cybercrime Convention
heise.de·1d
🛡Cybersecurity
Flag this post
Automated Anomaly Detection in Cryo-EM Density Maps via Multi-Scale Fourier Analysis and Bayesian Calibration
dev.to·7h·
Discuss: DEV
📄Document Digitization
Flag this post
CXRAgent: Director-Orchestrated Multi-Stage Reasoning for Chest X-Ray Interpretation
arxiv.org·15h
Proof Automation
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·15h
🧮Algebraic Datatypes
Flag this post