AWS account hygiene
me.micahrl.com·1d
🖥️Self-hosted Infrastructure
Flag this post
Proton launches 'Data Breach Observatory' to track personal info leaks
engadget.com·2h
🔓Hacking
Flag this post
Corero Network Security Solves Encrypted DDoS Blind Spot for Service Providers and Enterprises
corero.com·2d
🔓LDAP Injection
Flag this post
I accidentally created digital life. Now I need to figure out how to tune it.
youtube.com·8h·
Discuss: r/homelab
📲syncthing
Flag this post
Ejabberd 25.10 / ProcessOne – Erlang Jabber/XMPP/Matrix Server – Communication
process-one.net·17h·
Discuss: Hacker News
📦Deflate
Flag this post
Bypassing Cloudflare in 2026: Six Proven Strategies for Seamless Automation
dev.to·6h·
Discuss: DEV
🌐DNS Security
Flag this post
Subagents with MCP
cra.mr·1d·
Discuss: Hacker News
Proof Automation
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.com·1d
🚀Indie Hacking
Flag this post
F5 Is Misleading the Market – The Breach Is Nowhere Near Contained
reporter.deepspecter.com·19h·
Discuss: Hacker News
🎫Kerberos Attacks
Flag this post
Aembit Introduces Identity and Access Management for Agentic AI
devops.com·1h
🔌Interface Evolution
Flag this post
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
dev.to·1d·
Discuss: DEV
🧅Tor Networks
Flag this post
Speedrunning an RL Environment
sidb.in·2d·
Discuss: Hacker News
⚔️Lean Tactics
Flag this post
How I Became the Unofficial Company Archivist (And Saw Things I Can’t Unsee)
infosecwriteups.com·4h
🏠Personal Archives
Flag this post
Generative AI Security: The Shared Responsibility Framework
enkryptai.com·22h·
Discuss: Hacker News
🏠Homelab Automation
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.com·2d
🎯NTLM Attacks
Flag this post
BitcoinOS $BOS Token Is Live On Binance Alpha & Top Tier CEX Listings, Advancing Institutional BTCfi
hackernoon.com·16h
🔗Hash Chains
Flag this post
Keeping the Internet fast and secure: introducing Merkle Tree Certificates
blog.cloudflare.com·2d·
🌳Archive Merkle Trees
Flag this post
Anomaly Detection in R: Origins, Methods, and Real-World Applications
dev.to·3h·
Discuss: DEV
👁️Observatory Systems
Flag this post
Meta denies torrenting 2,400 porn movies for AI training – says they were for "personal use"
techspot.com·3h
🏴‍☠️Piracy
Flag this post
**Automated Wear Debris Analysis & Predictive Maintenance via Acoustic Fingerprinting and Machine Learning**
dev.to·1d·
Discuss: DEV
🎵Acoustic Fingerprinting
Flag this post