Increasing the accessibility of managed security services
fastly.comยท21h
๐NTLM Forensics
Flag this post
Proof of the \( \left( \frac{c k^2 \ln m}{\ln \ln m} \right)^m \)-Bound (1)
sites.psu.eduยท1h
๐Error Bounds
Flag this post
Weekly Update 475
troyhunt.comยท3d
๐บKerberos Archaeology
Flag this post
Securing the AI Era: How Development, Security, and Compliance Must Evolve
devops.comยท3h
๐ฏThreat Hunting
Flag this post
Urgent alert issued to anyone who uses Gmail after 183 million passwords are leaked
the-independent.comยท22h
๐Password Cracking
Flag this post
X is getting closer to removing the last reminders of Twitter
theverge.comยท1d
๐Password Cracking
Flag this post
๐ Why Your "Forgot Password" Flow Sucks (And How We're Fixing It With AI)
๐Hacking
Flag this post
Survey: 98% Adopting LLMs into Apps, While 24% Still Onboard Security Tools
๐Interface Evolution
Flag this post
Monitoring a UPS with Telegraf and Grafana
๐eBPF
Flag this post
How blocks are chained in a blockchain
๐Hash Chains
Flag this post
OAuth Isnโt Enough for Agents
๐WASM Capabilities
Flag this post
Automated Validation of Distributed Systems Through Hyper-Scoring and Continuous Code Synthesis
๐Concolic Testing
Flag this post
original โ
๐ซKerberos Attacks
Flag this post
Yet another way to use Tornado Cash in 2025, a tool implemented in Python&C++
๐Apache Kafka
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.comยท5h
๐Indie Hacking
Flag this post
Dubious security vulnerability: Denial of service by loading a very large file
๐ฃCompression Security
Flag this post
Loading...Loading more...