GoMem is a high-performance memory allocator library for Go
github.com·16h
🧠Memory Allocators
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·54m·
Discuss: Hacker News
🛡️RISC-V Security
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.com·37m·
🛠️Greaseweazle
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·21h
🔲Cellular Automata
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com·1d
🌡️Preservation Entropy
How to Tame Varnish Memory Usage Safely
fastly.com·1d
🎯Performance Forensics
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·4h
🔓Hacking
Finding a VS Code Memory Leak
randomascii.wordpress.com·22h·
🛠️Greaseweazle
Metasploit Wrap Up 10/09/2025
rapid7.com·22h
🛡️eBPF Security
An enough week
blog.mitrichev.ch·23h·
📈Linear programming
A disenshittification moment from the land of mass storage
doctorow.medium.com·6h
🧲Magnetic Philosophy
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.com·4h
🔍NTLM Forensics
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
Real-Time Anomaly Attribution via Hybrid Graph Neural Network & Causal Inference
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·5h
🔓Hacking
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·11h
📞Session Types
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·1d
🔍eBPF
Profiling Your Code: 5 Tips to Significantly Boost Performance
usenix.org·17h
📊Performance Profiling
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·15h
💻Local LLMs
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security