Error'd: Once Is Never Enough
thedailywtf.comยท2d
๐งชHardware Fuzzing
Flag this post
Anatomy of a cyberattack with a hangover: How Japan was left without beer
english.elpais.comยท2d
๐Hacking
Flag this post
0055: consulting, sql needed structure, slow forum, on the line, out of thin air, papers, other stuff
scattered-thoughts.netยท1d
๐ฆRust Macros
Flag this post
End-to-end phishing resistance: Stretch goal or short-term reality?
duo.comยท5d
๐Hacking
Flag this post
Privacy Risks of 1x Neo Robot
๐ Home Automation
Flag this post
AI Broke Interviews
๐Vector Forensics
Flag this post
Scams at scale
๐Network Security
Flag this post
Making MLS More Decentralized
๐ณArchive Merkle Trees
Flag this post
Claude can be tricked into sending your private company data to hackers - all it takes is some kind words
techradar.comยท1d
๐Indie Hacking
Flag this post
AI blew open software security, now OpenAI wants to fix it with an agent called Aardvark
๐Hacking
Flag this post
Engineering a Rust optimization quiz
fasterthanli.meยท21h
๐ฆRust Macros
Flag this post
How an Oregon court became the stage for a $115,000 showdown between Meta and Facebook creators
engadget.comยท1d
๐Indie Hacking
Flag this post
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
isc.sans.eduยท2d
๐ซKerberos Exploitation
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท2d
๐Hash Functions
Flag this post
Punching Holes into Firewalls
๐DNS over QUIC
Flag this post
Loading...Loading more...