FunkSec โ€“ Alleged Top Ransomware Group Powered by AI
research.checkpoint.comยท58mยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Your Free VPN App Might Be Spying on You
lifehacker.comยท37m
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Best-in-Class GenAI Security: When CloudGuard WAF Meets Lakera
blog.checkpoint.comยท7h
๐Ÿ Homelab Pentesting
Flag this post
SoK: Security Evaluation of Wi-Fi CSI Biometrics: Attacks, Metrics, and Systemic Weaknesses
arxiv.orgยท14h
๐Ÿ‘๏ธPerceptual Hashing
Flag this post
I Tested โ€œSpiritual Technologyโ€ on My Genes and Discovered a Deception Detector
hackernoon.comยท6h
๐Ÿš€Indie Hacking
Flag this post
New Android/BankBot-YNRK Trojan Reinforces Mobile Banking Threats
zimperium.comยท5h
๐Ÿ”BitFunnel
Flag this post
North Korean threat actors use JSON sites to deliver malware via trojanized code
securityaffairs.comยท8h
๐Ÿ”“Hacking
Flag this post
OSINT Analysis Intelligence Report Writing
dutchosintguy.comยท11h
๐Ÿ”ŽOSINT Techniques
Flag this post
Why our own clicks are often cybercrime's greatest allies
techradar.comยท9h
๐Ÿ”“Hacking
Flag this post
Flare-On 12: NTFSM - Solving a Finite State Machine with Binary Ninja
jhalon.github.ioยท4d
๐ŸงชBinary Fuzzing
Flag this post
New computational tool helps scientists interpret complex single-cell data
phys.orgยท17m
๐Ÿ‘๏ธDocument OCR
Flag this post
Code Smell 314 - Model Collapse
dev.toยท18hยท
Discuss: DEV
๐Ÿ”“Reverse engineering
Flag this post
Scammers are sending bogus copyright warnings to steal your X login
malwarebytes.comยท5h
๐Ÿดโ€โ˜ ๏ธPiracy
Flag this post
New Security Tools Target Growing macOS Threats
darkreading.comยท2d
๐Ÿš€Indie Hacking
Flag this post
Robust peak detection algorithm using z-scores
stackoverflow.comยท20hยท
Discuss: Hacker News
๐ŸŒŠDigital Signal Processing
Flag this post
Granular Regulation: A Future-Ready Framework for Effective AI Governance and Beyond
circleid.comยท1h
โš–๏ธLegal Compliance
Flag this post
Logitech leaks data after zero-day attack
theregister.comยท20h
๐Ÿ›กCybersecurity
Flag this post
Examining the Security Posture of an Anti-Crime Ecosystem
github.comยท1dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.comยท4d
๐Ÿ”“Password Cracking
Flag this post