Why Your Passcode Should Repeat A Digit
mindyourdecisions.comยท2h
๐Ÿ”“Password Cracking
Flag this post
A Newark trading card store got a surprise in the mail: Three packages loaded with meth, MDMA, and Xanax
mercurynews.comยท3h
โš–๏ธDigital Evidence
Flag this post
Announcing Incus 6.18
stgraber.orgยท3h
๐Ÿ”ŒOperating system internals
Flag this post
SAS Controllers and Flashy Lights (2021)
draeath.netยท6hยท
Discuss: Hacker News
๐Ÿ› ๏ธGreaseweazle
Flag this post
Naรฏve Shuffle Algorithm (2007)
blog.codinghorror.comยท3hยท
Discuss: Hacker News
๐ŸŒŠStreaming Algorithms
Flag this post
When fintech startups outgrow their own controls, Linqto's collapse as a warning
capitalfolly.comยท19hยท
Discuss: Hacker News
โœ…Format Verification
Flag this post
The Stupidly Simple Medium Hack That's Generating Page 1 Rankings in 2.5 Months
larslofgren.comยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Flag this post
Corporate kangaroo court - the GitHub edition
fev.alยท1dยท
Discuss: Hacker News
๐Ÿ Personal Archives
Flag this post
Cocoon from Telegram: A Decentralized AI Network That Pays GPU Owners in Crypto
decrypt.coยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธModern Terminals
Flag this post
How Google, Amazon, and CrowdStrike broke millions of systems
newsletter.techworld-with-milan.comยท4dยท
๐Ÿ‘๏ธObservatory Systems
Flag this post
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Archival Workflows
Flag this post
Ehxb | File Upload Vulnerabilities I
infosecwriteups.comยท13h
๐Ÿ›ก๏ธWASM Security
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Quantum Security
Flag this post
REIT Earnings Halftime Report
seekingalpha.comยท8h
โšกHTMX
Flag this post
How an ex-L3 Harris Trenchant boss stole and sold cyber exploits to Russia
techcrunch.comยท1h
๐Ÿ”“Hacking
Flag this post
China-linked UNC6384 exploits Windows zero-day to spy on European diplomats
securityaffairs.comยท2d
๐ŸŽซKerberos Exploitation
Flag this post
Relevant โ€” TryHackMe Room Walkthrough
infosecwriteups.comยท4d
๐ŸŽฏNTLM Attacks
Flag this post
Beyond Localhost: Security, Authentication, and Real-World Sources
hackernoon.comยท18h
๐ŸŽฌWebCodecs
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.comยท3d
๐ŸŽฏThreat Hunting
Flag this post
Aembit Introduces Identity And Access Management For Agentic AI
hackernoon.comยท3d
๐Ÿ”“Hacking
Flag this post