Three ways formally verified code can go wrong in practice
buttondown.comยท22m
๐Ÿ“œProof Carrying Code
U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท9h
๐Ÿ›กCybersecurity
Detecting DLL hijacking with machine learning: real-world cases
securelist.comยท4d
๐ŸŽซKerberos Exploitation
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.comยท1h
๐Ÿ’ฃZIP Vulnerabilities
More on Carmichael
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
CubicLog โ€“ A single-binary logging server with zero-config smart analytics
github.comยท19hยท
Discuss: Hacker News
๐Ÿ“Log Parsing
The Importance of Email Security
securityscorecard.comยท2h
๐ŸŽฏThreat Hunting
Getting a Hypergraph of Functions to a Browser
systeminit.comยท1dยท
Discuss: Hacker News
๐Ÿ“E-graphs
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท3hยท
Discuss: Hacker News
๐Ÿ”—Lisp
A Story About Bypassing Air Canada's In-Flight Network Restrictions
ramsayleung.github.ioยท9hยท
๐ŸŒDNS over QUIC
AI can help your DevSecOps pipeline
spiceworks.comยท4hยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Customizing text content moderation with Amazon Nova
aws.amazon.comยท19h
๐Ÿ“ŠFeed Optimization
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.comยท1dยท
๐ŸงฎAlgebraic Datatypes
100 Poisoned Examples Can Hijack Any AI Model (Even GPT-4-Scale LLMs)
dev.toยท22hยท
Discuss: DEV
โšกProof Automation
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Preference-aware routing for Claude Code 2.0
archgw.comยท19hยท
Discuss: Hacker News
๐Ÿ”—Topological Sorting
Why Self-Host?
romanzipp.comยท1dยท
Discuss: Hacker News
๐Ÿ Personal Archives
10 Data + AI Observations for Fall 2025
towardsdatascience.comยท3h
๐ŸŒŠStream Processing
Speed Matters: How We Achieve the Fastest Web Agent
browser-use.comยท1dยท
Discuss: Hacker News
๐ŸŽฌWebCodecs
API Attack Awareness: Injection Attacks in APIs โ€“ Old Threat, New Surface
lab.wallarm.comยท1d
๐Ÿ”“LDAP Injection