Speakers
dcc.ac.uk·11h
💿FLAC Archaeology
Flag this post
Windows 11 videos demonstrating account and hardware requirements bypass purged from YouTube — platform says content ‘encourages dangerous or illegal activities...
🔌Operating system internals
Flag this post
5 Essential Steps to Strengthen Kubernetes Egress Security
tigera.io·2d
📦Container Security
Flag this post
AI browsers are a cybersecurity time bomb
theverge.com·10h
🔓Hacking
Flag this post
Show HN: AI tool to scan internal docs for GDPR violations before audits
⚖️Legal Compliance
Flag this post
Porting the Windows 95 interface to Windows NT was a complex back-and-forth process
techspot.com·5h
🕸️WASM Archives
Flag this post
Building AI Agents on the Frontend with Sam Bhagwat and Abhi Aiyer
softwareengineeringdaily.com·17h
⚡Proof Automation
Flag this post
Show HN: Secure Extensions Marketplace for Chrome,Edge,Firefox,VSCode,NPM
🛡️WASM Sandboxing
Flag this post
You Don't Own Your Reputation
🎫Kerberos Attacks
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.com·2d
🚀Indie Hacking
Flag this post
Aembit Introduces Identity and Access Management for Agentic AI
devops.com·14h
🔌Interface Evolution
Flag this post
Proton trains new service to expose corporate infosec cover-ups
theregister.com·8h
🔓Hacking
Flag this post
How I Became the Unofficial Company Archivist (And Saw Things I Can’t Unsee)
infosecwriteups.com·17h
🏠Personal Archives
Flag this post
Infostealer for Windows, macOS and Linux found in ten packages on npm
heise.de·16h
🔓Open Source Software
Flag this post
Loading...Loading more...