Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท18hยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท29m
๐Ÿ•ต๏ธVector Smuggling
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท6h
๐ŸŒŠStream Ciphers
Flag this post
Notes from RIPE 91
blog.apnic.netยท11h
๐ŸŒDNS over QUIC
Flag this post
Opportunistically Parallel Lambda Calculus
dl.acm.orgยท12hยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท3h
๐Ÿ”Hash Functions
Flag this post
LLM AuthZ Handbook: A Practical Guide for AI Builders and Users
flatt.techยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท21h
๐Ÿ”Quantum Security
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netยท8h
๐ŸŒDNS Security
Flag this post
Punching Holes into Firewalls
sebsauvage.netยท1dยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
Making MLS More Decentralized
blog.phnx.imยท2dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
Show HN: IRCd in Pure Bash
github.comยท12hยท
Discuss: Hacker News
โœ…Shell Verification
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
lakera.aiยท18hยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท23h
๐Ÿฆ Parasitic Storage
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.orgยท6h
๐Ÿ“Log Parsing
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comยท12hยท
Discuss: Substack
๐ŸŒNetworkProtocols
Flag this post
Issue 496
haskellweekly.newsยท22h
๐Ÿ”—Functional Compilers
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ฒLattice Cryptography
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท17h
๐ŸŒBGP Security
Flag this post