More on Carmichael
johndcook.com·15h
🔢Reed-Solomon Math
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.org·1d·
Discuss: Hacker News
🔒Language-based security
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·1h
🔗Graph Isomorphism
HTTP/1.1 must die: Dafydd Stuttard on what this means for enterprise security
portswigger.net·15h
📡BGP Archaeology
Malicious NPM Packages Host Phishing Infrastructure Targeting 135
socket.dev·11h·
Discuss: Hacker News
🎫Kerberos Exploitation
CVE-2024-36401 - GeoServer - tailoring a public PoC to enable at-scale high-confidence detection
bitsight.com·8h
🧪CBOR Fuzzing
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·1d
🌐WARC Forensics
Crimson Collective: A New Threat Group Observed Operating in the Cloud
rapid7.com·2d
🎫Kerberos Exploitation
CubicLog – A single-binary logging server with zero-config smart analytics
github.com·7h·
Discuss: Hacker News
📝Log Parsing
Tool or Agent? The impact of AI in your code and in your wallet It all boils down to math again!
blog.codeminer42.com·16h
Proof Automation
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·3d
🎫Kerberos Attacks
Modern C and initializing an array
subethasoftware.com·11h
🗂Data structures
What the 2025 Elastic Global Threat Report reveals about the evolving threat landscape
elastic.co·2d
🎯Threat Hunting
A small number of samples can poison LLMs of any size
anthropic.com·13h·
🔍Vector Forensics
Investigating targeted “payroll pirate” attacks affecting US universities
microsoft.com·14h
🎯NTLM Attacks
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·3d
🎫Kerberos Exploitation
The effective LLM multi-tenant security with SQL
getbruin.com·10h·
Discuss: Hacker News
🗄️Database Internals
1Password might just have a solution to the password security problem posed by AI agents
techradar.com·18h
Proof Automation
What is Mobile Threat Defense (MTD)?
jamf.com·21h
🎯Threat Hunting