Rating 26 years of Java changes
neilmadden.blogΒ·13h
πŸ—οΈCompiler Archaeology
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comΒ·22h
🎫Kerberos Exploitation
New release!
pdp2011.sytse.netΒ·13h
πŸ•ΈοΈWASM Archives
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.comΒ·21h
πŸ”“Hacking
The Data Backbone of LLM Systems
infoq.comΒ·1dΒ·
Discuss: Lobsters
πŸ”—Constraint Handling
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
welivesecurity.comΒ·1d
πŸ”’Secure Boot
Betrusted – Building transparent, secure computing from the silicon up
betrusted.ioΒ·49mΒ·
Discuss: Hacker News
🀝Distributed Consensus
Enhanced Automated Trace Explosive Analysis via Multi-Modal Data Fusion and Bayesian Inference
dev.toΒ·7hΒ·
Discuss: DEV
🌈Spectroscopy
Memory Integrity Enforcement
mjtsai.comΒ·1d
🏷️Memory Tagging
Into the Deep DNS Sea with the JSCEAL Campaign
circleid.comΒ·2d
πŸ“‘DNS Archaeology
ChillyHell: A Deep Dive into a Modular macOS Backdoor
jamf.comΒ·3d
πŸ“ŸTerminal Forensics
How We Built Our Model-Agnostic Agent for Log Analysis
blog.runreveal.comΒ·2dΒ·
Discuss: Hacker News
🎯Threat Hunting
OpenSSF Experts Weigh in on CISA’s SBOM Minimum Elements Update
thenewstack.ioΒ·19h
❄️Nix Adoption
Reversing the licensing on a Quantum Scalar i40
blackjack.codesΒ·1dΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Akira Ransomware exploits year-old SonicWall flaw with multiple vectors
securityaffairs.comΒ·1d
πŸ”“Hacking
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cxΒ·1dΒ·
Discuss: Hacker News
πŸ”¬Binary Analysis
9 Best Practices for API Security βš”οΈ
newsletter.systemdesign.oneΒ·1d
⚑gRPC
Kerberoasting
blog.cryptographyengineering.comΒ·2dΒ·
🎫Kerberos Exploitation
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioΒ·2d
πŸ”’Secure Boot
Product comparison: Detectify vs. Intruder
blog.detectify.comΒ·2d
πŸ•΅οΈPenetration Testing