Memory leaks: the forgotten side of web performance (2022)
nolanlawson.com·3h·
Discuss: Hacker News
🧠Memory Allocators
The Next Computing Revolution: Bringing Processing Inside Memory
computer.org·23h·
Discuss: Hacker News
Hardware Transactional Memory
Adversary TTP Simulation Lab
infosecwriteups.com·14h
🏠Homelab Pentesting
How we trained an ML model to detect DLL hijacking
securelist.com·1d
🔗Binary Similarity
Googles CodeMender is designed to automatically find and fix security flaws in software
the-decoder.com·5h
🧮Z3 Solver
Detection Engineering: Practicing Detection-as-Code – Monitoring – Part 7
blog.nviso.eu·12h
🚨Incident Response
VMRay SentinelOne Integration Delivers Full Threat Context
vmray.com·1h
👁️Observatory Systems
These are the tools we use to build and maintain our precious tech, and they're on sale for Amazon Prime Day
tomshardware.com·1d
🎮Switch Archaeology
Latency vs. Accuracy for LLM Apps — How to Choose and How a Memory Layer Lets You Win Both
dev.to·8h·
Discuss: DEV
Performance Mythology
Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2
hex-rays.com·5h
🦀Rust Macros
Threat Intelligence Report: Daejeon NIRS Data Center Fire Potential DPRK APT Nexus
krypt3ia.wordpress.com·3h
🎯Threat Hunting
Forensic Video Workflow with Amped FIVE – Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.com·5h
⚖️Digital Evidence
The ReD Hat Consulting Breach – An Analysis
digitalforensicsmagazine.com·10h
🔓Hacking
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1d
🔐Cryptographic Archaeology
M900 - 10FLS00P00 - Not utilising Cores, seems throttled.
reddit.com·15h·
Discuss: r/homelab
🔌Operating system internals
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·1d·
Discuss: Hacker News
💻Local LLMs
Release of ERNW White Paper 73: Analyzing WinpMem Driver Vulnerabilities
insinuator.net·5d
🔍NTLM Archaeology
Souvenir
deprogrammaticaipsum.com·1d
🔩Systems Programming