Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comΒ·1d
🦠Parasitic Storage
Flag this post
EY 4TB Data Leak
neosecurity.nlΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.orgΒ·13h
πŸ“Log Parsing
Flag this post
Encryption is under attack – but it's "vital for law enforcement," said former US investigator
techradar.comΒ·3h
πŸ”“Hacking
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”²Lattice Cryptography
Flag this post
Issue 496
haskellweekly.newsΒ·1d
πŸ”—Functional Compilers
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comΒ·2d
🦠Malware Analysis
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comΒ·23h
🌐BGP Security
Flag this post
AI scrapers request commented scripts
cryptography.dogΒ·1hΒ·
Discuss: Hacker News
🌐DNS Security
Flag this post
Punching Holes into Firewalls
sebsauvage.netΒ·1dΒ·
Discuss: Hacker News
🌐DNS over QUIC
Flag this post
Hardware to Prove Humanity
juliver.bearblog.devΒ·23hΒ·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.comΒ·21h
🦠Malware Analysis
Flag this post
Go and enhance your calm: demolishing an HTTP/2 interop problem
blog.cloudflare.comΒ·3hΒ·
Discuss: Hacker News
⚑gRPC
Flag this post
wastrel, a profligate implementation of webassembly
wingolog.orgΒ·18hΒ·
🌐WASI
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comΒ·19hΒ·
Discuss: Substack
🌐NetworkProtocols
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comΒ·23h
πŸ”—Combinatory Logic
Flag this post
Agentic AI and Security
martinfowler.comΒ·3dΒ·
πŸ’»Local LLMs
Flag this post
Security Doesn’t Have to Hurt
docker.comΒ·4h
πŸ”Capability Security
Flag this post
Age Verification, Estimation, Assurance, Oh My! A Guide to the Terminology
eff.orgΒ·18h
πŸ›‘Cybersecurity
Flag this post
How to Harden AI Instances for Privacy and Security
techshinobi.orgΒ·1dΒ·
Discuss: Hacker News
πŸ›‘οΈWASM Sandboxing
Flag this post