Which OAuth Flow Should You Use?
nimblesa.comยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Security
Learning
reddit.comยท14hยท
Discuss: r/golang
๐Ÿง Lisp Dialects
HTB Vintage Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.comยท2h
๐Ÿ”NTLM Archaeology
The Security Time Capsule: Evolving Beyond Legacy Pen Testing
praetorian.comยท1d
๐Ÿ”Archive Cryptanalysis
A Timeline of Public Key Infrastructure: What Worked, What Failed, and Whatโ€™s Next
hackernoon.comยท3d
๐Ÿ”PKI Archaeology
Polymorphic symmetric multiple dispatch with variance
dl.acm.orgยท1dยท
Discuss: Hacker News
๐Ÿ”คType Theory
Mitigating supply chain vulnerabilities
techradar.comยท1h
๐ŸŽฏThreat Hunting
Standards for Age Verification
avpassociation.comยท1dยท
Discuss: Hacker News
๐Ÿ“‹Format Specification
**Essential Python Security Practices: Building Robust, Attack-Resistant Applications**
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Zero-knowledge proofs unlock privacy in digital identity
hopae.comยท4dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand
theregister.comยท13h
๐ŸŽซKerberos Attacks
Weโ€™re changing how we deliver support to SecureDrop users
securedrop.orgยท1d
๐Ÿ›กCybersecurity
Open source all the way down at APNIC 60
blog.apnic.netยท1d
๐Ÿ›ก๏ธeBPF Programs
'K2 Think' AI Model Jailbroken Mere Hours After Release
darkreading.comยท20h
๐Ÿ”“Hacking
Quectel KCMCA6S industrial wM-bus modules target smart metering
cnx-software.comยท1d
๐ŸฆพARM Cortex-M
Pupils hacking their own schools for fun, watchdog warns
the-independent.comยท16h
๐Ÿ”“Hacking
Contabo Security Defaults Encourage Using SSH Passwords
jamesoclaire.comยท8hยท
Discuss: Hacker News
๐ŸŒŠStream Ciphers
There Are Right and Wrong Ways to Share Your Passwords
lifehacker.comยท2d
๐ŸŽฏNTLM Attacks
Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night
securityboulevard.comยท22hยท
Discuss: Hacker News
๐Ÿ”“Hacking