Error'd: Once Is Never Enough
thedailywtf.com·8h
🧪Hardware Fuzzing
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·6h
🛡️eBPF Security
Flag this post
Anatomy of a cyberattack with a hangover: How Japan was left without beer
english.elpais.com·1d
🔓Hacking
Flag this post
Show HN: Loopletter: Open-source email marketing platform
github.com·31m·
Discuss: Hacker News
🔄Sync Engine
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
λLambda Formalization
Flag this post
Exploring Cloud Key Management Options
devops.com·1d
🔐Archive Encryption
Flag this post
How Google, Amazon, and CrowdStrike broke millions of systems
newsletter.techworld-with-milan.com·23h·
👁️Observatory Systems
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
lakera.ai·23h·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
koi.ai·1d·
📦Package Managers
Flag this post
See the business data leaking onto the dark web with Proton’s Data Breach Observatory
proton.me·1d
🔓Hacking
Flag this post
Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
theregister.com·20h
🔓Hacking
Flag this post
End-to-end phishing resistance: Stretch goal or short-term reality?
duo.com·3d
🔓Hacking
Flag this post
Unpatched Bug Can Crash Chromium-Based Browsers in Seconds
it.slashdot.org·17h
🔓Hacking
Flag this post
Herodotus Android malware mimics human typing to evade detection
securityaffairs.com·2d
🦠Malware Analysis
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.com·17h·
Discuss: Hacker News
📡DNS Archaeology
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.com·4h
🎯Threat Hunting
Flag this post
Understanding the Worst .NET Vulnerability
andrewlock.net·3d·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
"Trusted Crypto Recovery Experts: My Road With Dexdert Net Pro Recovery "
dev.to·54m·
Discuss: DEV
🏺Kerberos Archaeology
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.com·1d
🌳Archive Merkle Trees
Flag this post
Scam: Inside South-East Asia's Cybercrime Compounds
lrb.co.uk·1d·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post