Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.com·2d
🏠Homelab Federation
Assessing microplastic contamination in milk and dairy products
nature.com·2h·
Discuss: Hacker News
🛠️Greaseweazle
Indian student captured by Ukraine joined Russian army to avoid drug charges
bbc.com·11h·
Discuss: Hacker News
🔍Polish Cryptanalysis
Music and marigolds: Inside India’s extravagant fake wedding parties
the-independent.com·19h
🌍Cultural Computing
PoC for Critical Lua Engine Vulnerabilities in Redis 7.4.5
redrays.io·1d·
Discuss: Hacker News
🧪CBOR Fuzzing
Pokémon Color Palette Swapping
fanyangxyz.github.io·23h·
Discuss: Hacker News
🌈Color Science
Russia’s Answer to WeChat
theatlantic.com·1d·
Discuss: Hacker News
⚗️Eastern Computing
Enigma archive is now complete
enigmaticcode.wordpress.com·6h·
Discuss: Hacker News
🔍Polish Cryptanalysis
How to Use AI to Help with Software Engineering Tasks
newsletter.eng-leadership.com·11h·
Discuss: Hacker News
Proof Automation
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.org·2d
🔓Hacking
Hiring in the Age of AI
morningcoffee.io·6h·
Discuss: Hacker News
📏Code Metrics
I took the Game of Thrones smartphone to a real castle to see if it could stick the (King's) landing
techradar.com·1d
🌈Color Archaeology
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·2d·
Discuss: Hacker News
🚀Indie Hacking
Title: How I built a lightweight runtime stability layer for AI agents
dev.to·16h·
Discuss: DEV
👁️System Observability
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·1d·
🔗Data Provenance
Graph Neural Networks: A Reality Check on Verifying Readout by Arvind Sundararajan
dev.to·9h·
Discuss: DEV
🧠Machine Learning
I built a Go query builder for Vespa (vespa-go)
reddit.com·7h·
Discuss: r/golang
🧩SQLite Extensions
From Clicks to Code: Building a Production‑Ready EVM Transaction Client (Approve, Mint, Swap, EIP‑1559)
dev.to·3d·
Discuss: DEV
Format Verification
Beyond Minimalism: Designing Interfaces That Express Personality
dev.to·1d·
Discuss: DEV
❄️Nordic Design Philosophy
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·2d·
Discuss: Hacker News
🎫Kerberos Exploitation