#TIL: Cyrillic Numbers
thomasrigby.com·1d
📜Binary Philology
Flag this post
Adventureland Video Game
🏺Gaming Archaeology
Flag this post
Hou Tu Pranownse Inglish
🗣️CMU Pronouncing
Flag this post
The End Of Legacy SIEM: Why It’s Time To Take Command
rapid7.com·12h
🚨Incident Response
Flag this post
Devuan GNU+Linux "Excalibur": Debian 13 "Trixie" without systemd
heise.de·5h
🔌Operating system internals
Flag this post
DevTrends MCP – Real-Time Developer Intelligence for AI Coding Assistants
🌊Stream Processing
Flag this post
A new SQL-powered permissions system in Datasette 1.0a20
simonwillison.net·5h
🏺Database Archaeology
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.com·1d
🦠Malware Analysis
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.com·4d
🎯Threat Hunting
Flag this post
LangChain vs LangGraph: A Beginner’s Guide to Building Smarter AI Workflows
hackernoon.com·1d
🔗Topological Sorting
Flag this post
A Hacker’s Journey to NASA’s Hall of Fame
infosecwriteups.com·1d
🔓Hacking
Flag this post
5 ways to prevent password reset attacks
fingerprint.com·6d
🎫Kerberos Attacks
Flag this post
Idor — TryHackMe writeup
infosecwriteups.com·4d
🌐DNS Security
Flag this post
Ariadne: A Controllable Framework for Probing and Extending VLM Reasoning Boundaries
arxiv.org·21h
🎯Proof Tactics
Flag this post
NSA Issues Microsoft Exchange Server ‘High-Risk Of Compromise’ Alert
forbes.com·3d
🏢Active Directory
Flag this post
Supercharge Your LLMs: Turn Basic APIs into 3D AI Desktop Companions with Zero Code Change
🔌Interface Evolution
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.com·5d
🦠Malware Analysis
Flag this post
Loading...Loading more...