Turning smartphones into earthquake sensors
phys.orgΒ·1d
πŸ“±QR Archaeology
Flag this post
Proton Exposes 300 Million Stolen Credentials β€” 49% Include Passwords
forbes.comΒ·23h
πŸ”“Password Cracking
Flag this post
Beginners Guide to Building a Hardware Hacking Lab
voidstarsec.comΒ·9hΒ·
Discuss: Hacker News
βš™οΈDIY Electronics
Flag this post
Infrastructure as Code
opentofu.orgΒ·2dΒ·
Discuss: Hacker News
🧱Immutable Infrastructure
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
lakera.aiΒ·1dΒ·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
The worst part of dial-up internet is back - Raspberry Pi modder lets you "hear" your Wi-Fi
techradar.comΒ·1d
πŸ§ͺCassette Hacks
Flag this post
7 Benefits of App Migration for Modernization Maintenance
vibe.forem.comΒ·11hΒ·
Discuss: DEV
🚚Data Migration
Flag this post
ESTIMED_hackathon1_SESLab
hackster.ioΒ·2d
πŸ•ΈοΈMesh Networking
Flag this post
Reverie: An ergonomic and safe syscall interception framework for Linux
github.comΒ·2dΒ·
Discuss: Hacker News
πŸ”©Systems Programming
Flag this post
Your B2B Content Funnel is a Leaky API. Here's How to Patch It.
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”„RSS Infrastructure
Flag this post
Another audit, same result - Mullvad proven secure and log-free in latest audit check
techradar.comΒ·2d
βœ…Archive Fixity
Flag this post
Cloud Outages Highlight the Need for Resilient, Secure Infrastructure Recovery
darkreading.comΒ·1d
πŸ‘οΈObservatory Systems
Flag this post
UNC6384 Targets European Diplomatic Entities With Windows Exploit
darkreading.comΒ·3h
🎫Kerberos Exploitation
Flag this post
Making the Internet observable: the evolution of Cloudflare Radar
blog.cloudflare.comΒ·4dΒ·
Discuss: Hacker News
πŸ•ΈοΈMesh Networking
Flag this post
Show HN: sjl – Simple JSON Logger for Rust
github.comΒ·21hΒ·
Discuss: Hacker News
πŸ”CBOR
Flag this post
Anomaly Detection in R: Origins, Methods, and Real-World Applications
dev.toΒ·1dΒ·
Discuss: DEV
πŸ‘οΈObservatory Systems
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Optical Data Center Security Logs via Graph Neural Networks
dev.toΒ·6dΒ·
Discuss: DEV
🎯Threat Hunting
Flag this post