Increasing the accessibility of managed security services
fastly.comยท21h
๐Ÿ”NTLM Forensics
Flag this post
Proof of the \( \left( \frac{c k^2 \ln m}{\ln \ln m} \right)^m \)-Bound (1)
sites.psu.eduยท1h
๐Ÿ“Error Bounds
Flag this post
Weekly Update 475
troyhunt.comยท3d
๐ŸบKerberos Archaeology
Flag this post
Securing the AI Era: How Development, Security, and Compliance Must Evolve
devops.comยท3h
๐ŸŽฏThreat Hunting
Flag this post
The Impossible Optimization, and the Metaprogramming to Achieve It
verdagon.devยท1dยท
๐ŸงชBinary Fuzzing
Flag this post
Urgent alert issued to anyone who uses Gmail after 183 million passwords are leaked
the-independent.comยท22h
๐Ÿ”“Password Cracking
Flag this post
X is getting closer to removing the last reminders of Twitter
theverge.comยท1d
๐Ÿ”“Password Cracking
Flag this post
๐Ÿš€ Why Your "Forgot Password" Flow Sucks (And How We're Fixing It With AI)
dev.toยท3dยท
Discuss: DEV
๐Ÿ”“Hacking
Flag this post
Survey: 98% Adopting LLMs into Apps, While 24% Still Onboard Security Tools
pynt.ioยท13hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Flag this post
How Open Source License Scanners Work
fossa.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Flag this post
Monitoring a UPS with Telegraf and Grafana
bentasker.co.ukยท1dยท
Discuss: Hacker News
๐Ÿ”eBPF
Flag this post
How blocks are chained in a blockchain
johndcook.comยท1dยท
๐Ÿ”—Hash Chains
Flag this post
OAuth Isnโ€™t Enough for Agents
osohq.comยท21hยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Flag this post
Automated Validation of Distributed Systems Through Hyper-Scoring and Continuous Code Synthesis
dev.toยท3hยท
Discuss: DEV
๐Ÿ”Concolic Testing
Flag this post
Fil-C: A memory-safe C implementation
lwn.netยท3hยท
๐Ÿง Separation Logic
Flag this post
original โ†—
alearningaday.blogยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Flag this post
Yet another way to use Tornado Cash in 2025, a tool implemented in Python&C++
news.ycombinator.comยท20hยท
Discuss: Hacker News
๐ŸŒŠApache Kafka
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.comยท5h
๐Ÿš€Indie Hacking
Flag this post
Dubious security vulnerability: Denial of service by loading a very large file
devblogs.microsoft.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฃCompression Security
Flag this post
Experiences Working with Claude Code
realfiction.netยท3hยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
Flag this post