Memory leaks: the forgotten side of web performance (2022)
nolanlawson.com·7h·
Discuss: Hacker News
🧠Memory Allocators
The Next Computing Revolution: Bringing Processing Inside Memory
computer.org·1d·
Discuss: Hacker News
Hardware Transactional Memory
Adversary TTP Simulation Lab
infosecwriteups.com·18h
🏠Homelab Pentesting
How we trained an ML model to detect DLL hijacking
securelist.com·1d
🔗Binary Similarity
Googles CodeMender is designed to automatically find and fix security flaws in software
the-decoder.com·9h
🧮Z3 Solver
Detection Engineering: Practicing Detection-as-Code – Monitoring – Part 7
blog.nviso.eu·16h
🚨Incident Response
VMRay SentinelOne Integration Delivers Full Threat Context
vmray.com·5h
👁️Observatory Systems
These are the tools we use to build and maintain our precious tech, and they're on sale for Amazon Prime Day
tomshardware.com·1d
🎮Switch Archaeology
Latency vs. Accuracy for LLM Apps — How to Choose and How a Memory Layer Lets You Win Both
dev.to·13h·
Discuss: DEV
Performance Mythology
Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2
hex-rays.com·9h
🦀Rust Macros
Threat Intelligence Report: Daejeon NIRS Data Center Fire Potential DPRK APT Nexus
krypt3ia.wordpress.com·7h
🎯Threat Hunting
Forensic Video Workflow with Amped FIVE – Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.com·9h
⚖️Digital Evidence
The ReD Hat Consulting Breach – An Analysis
digitalforensicsmagazine.com·14h
🔓Hacking
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1d
🔐Cryptographic Archaeology
M900 - 10FLS00P00 - Not utilising Cores, seems throttled.
reddit.com·19h·
Discuss: r/homelab
🔌Operating system internals
Responding to Cloud Incidents A Step-by-Step Guide from the 2025 Unit 42 Global Incident Response Report
unit42.paloaltonetworks.com·1h
🚨Incident Response
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·1d·
Discuss: Hacker News
💻Local LLMs
Release of ERNW White Paper 73: Analyzing WinpMem Driver Vulnerabilities
insinuator.net·5d
🔍NTLM Archaeology