Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Enhancing LLM Personality
funcall.blogspot.com·1d·
💻Local LLMs
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.io·2d
🔐CBOR
Flag this post
.NET 10 Is Coming: What's New, and Why It Matters
endpointdev.com·2d·
Discuss: Hacker News
🌐Web Standards
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
danglingpointers.substack.com·2d·
Discuss: Substack
Hardware Transactional Memory
Flag this post
From $15 to $500K: Live Cohort – Build Your High-Ticket SaaS with Me
vvgond.gumroad.com·5h·
Discuss: Hacker News
🚀Indie Hacking
Flag this post
What does computer literacy mean for 2026?
sjg.io·5d·
Discuss: Hacker News
🧠Personal Knowledge Base
Flag this post
Ask HN: Do you have an aversion to recent TLDs?
news.ycombinator.com·20h·
Discuss: Hacker News
🏠Personal Archives
Flag this post
FreeBSD shortly before 15.0: Trust is good, reproducibility is better
heise.de·1d
🔓Open Source Software
Flag this post
Exploring Test Automation in Biometric Authentication Testing
dev.to·2d·
Discuss: DEV
🧪Property-Based Testing
Flag this post
Ask HN: is this a common LLM-assisted development workflow?
news.ycombinator.com·24m·
Discuss: Hacker News
🦋Format Metamorphosis
Flag this post
Aisuru botnet is behind record 20Tb/sec DDoS attacks
securityaffairs.com·4d
🌐DNS Security
Flag this post
Free Alternatives to Cheaterbuster AI: Build Your Own AI Investigator
dev.to·13h·
Discuss: DEV
🔍BitFunnel
Flag this post
Keeping the Internet fast and secure: introducing Merkle Tree Certificates
blog.cloudflare.com·4d·
🌳Archive Merkle Trees
Flag this post
Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
unit42.paloaltonetworks.com·3d
🦠Malware Analysis
Flag this post
Tech With Tim: Blitzy vs Devin vs Factory: Which AI Platform is The Best?
dev.to·9h·
Discuss: DEV
🏺ZIP Archaeology
Flag this post
FreeBSD now supports OCI containers with Podman
discoverbsd.com·12h
📦Content Addressable
Flag this post
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
darkreading.com·3d
🎯Threat Hunting
Flag this post
Stop using pip install... at least not directly. Secure your Python supply chain with pipq.
dev.to·2d·
Discuss: DEV
🛡️CLI Security
Flag this post
Tech With Tim: Learn Fast API With This ONE Project
dev.to·17h·
Discuss: DEV
🎬WebCodecs
Flag this post
WASM-Adventure
github.com·1d·
🛡️WASM Security
Flag this post