Balance between refactoring and inheritance in your code
github.com·9h·
Discuss: Hacker News
Format Verification
A week in security (September 8 – September 14)
malwarebytes.com·14h
🔓Hacking
Physics-informed sensor coverage through structure preserving machine learning
arxiv.org·17h
🧠Machine Learning
Careless engineer stored recovery codes in plaintext, got whole org pwned
theregister.com·1h
🔍NTLM Forensics
Detecting Active Directory Password Spraying Article
adsecurity.org·2h
🏢Active Directory
NightMARE on 0xelm Street, a guided tour
elastic.co·3d
🧪Binary Fuzzing
Sprites mods - Hard disk hacking - Intro
web.archive.org·8h
🎮Cartridge Archaeology
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.com·4d
🛡️eBPF Security
Aviation Runway Cyber Range Security Case Study
pixelstech.net·12h
🔒WASM Capabilities
Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers
securelist.com·11h
🔓Hacking
Chinese malware is flooding GitHub pages - HiddenGh0st, Winos and kkRAT hit devs via SEO poisoning
techradar.com·29m
🚀Indie Hacking
Android Droppers Evolve to Deliver Spyware and SMS Stealers Under the Radar
zimperium.com·8h
📦Container Security
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·3d·
Discuss: Hacker News
🔬Binary Analysis
Sept 2025 – MacAdmins Meeting
apple.lib.utah.edu·3h
🍎Apple Archive
OTW - Bandit Level 4 to Level 5
tbhaxor.com·15h
🔧KAITAI
The State of Adversarial Prompts
blog.securitybreak.io·1d
🎯Threat Hunting
Automated Test Generation with Custom Claude Commands: Architecting Scalable Testing for Modern Node.js Applications
dev.to·52m·
Discuss: DEV
🔍Concolic Testing
Binary Patching: A Complete Step-by-Step Guide
infosecwriteups.com·6d
🔬Binary Analysis
Digital Forensics Jobs Round-Up, September 15 2025
forensicfocus.com·6h
🚨Incident Response
You’re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.com·3d
🎫Kerberos Attacks