The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·10h·
Discuss: Hacker News
🔐PKI Archaeology
A History of Active Directory Security
adsecurity.org·2d
🏺Kerberos Archaeology
Nix pills
nixos.org·17h
❄️Nixpkgs
Prompting Techniques for Specialised LLMs
dev.to·9h·
Discuss: DEV
🔗Constraint Handling
Red Stone One Carat — TryHackMe Challenge Write-up
infosecwriteups.com·1d
🛡️CLI Security
Release of ERNW White Paper 73: Analyzing WinpMem Driver Vulnerabilities
insinuator.net·3d
🧠Memory Forensics
Are Software Registries Inherently Insecure?
developers.slashdot.org·1h
📦Container Security
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·7h·
Discuss: Hacker News
🛡️WASM Security
Tape Library and Show Off
i.redd.it·3h·
Discuss: r/homelab
📼Cassette Archaeology
Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users
cybereason.com·1d
🧬PostgreSQL Forensics
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.com·11h·
🗝️Paleocryptography
Episode 166 - Beyond the PDP-11
adventofcomputing.libsyn.com·2h
🧲RISC-V Archaeology
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.edu·5d
🔓Password Cracking
Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap
circleid.com·2d
🌐DNS Security
Why did the über-protocols fail? A history of OOP RPC
medium.com·8h·
Discuss: Hacker News
🔌Interface Evolution
AKF: A modern synthesis framework for building datasets in digital forensics
sciencedirect.com·1d
🔍FLAC Forensics
This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model
hackaday.com·2d
🛡️RISC-V Security
“Networking for System Administrators” Kickstarter closing soon
mwl.io·12h
📦Git LFS
Forensic journey: hunting evil within AmCache
securelist.com·4d
🔍Binary Forensics
Public Key Infrastructure with Secure Shell
free-pmx.org·1d·
Discuss: r/homelab
🎯NTLM Attacks