Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท1dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post
Guide: TLS and QUIC
moq.devยท8hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท13h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท8h
๐Ÿ›ก๏ธeBPF Security
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท19h
๐ŸŒŠStream Ciphers
Flag this post
Oops, My UUIDs Collided
alexsci.comยท5hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท16h
๐Ÿ”Hash Functions
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท1d
๐Ÿ”Quantum Security
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท3h
๐Ÿ”“Hacking
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท3hยท
Discuss: Hacker News
โšกProof Automation
Flag this post
Context Engineering: The Foundation for Reliable AI Agents
thenewstack.ioยท3h
๐ŸŒŠStreaming Systems
Flag this post
Notes from RIPE 91
blog.apnic.netยท1d
๐ŸŒDNS over QUIC
Flag this post
Issue 496
haskellweekly.newsยท1d
๐Ÿ”—Functional Compilers
Flag this post
UNC6384 Targets European Diplomatic Entities With Windows Exploit
darkreading.comยท3h
๐ŸŽซKerberos Exploitation
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท5h
๐Ÿ”“Hacking
Flag this post
Opportunistically Parallel Lambda Calculus
dl.acm.orgยท1dยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
Flag this post
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
tenable.comยท10h
๐Ÿ”Capability Systems
Flag this post
Clean Code: Functions and Error Handling in Go: From Chaos to Clarity [Part 1]
hackernoon.comยท17h
โœ…Format Verification
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netยท21h
๐ŸŒDNS Security
Flag this post
Making MLS More Decentralized
blog.phnx.imยท2dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post