Feeds to Scour
SubscribedAll
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.comΒ·1dΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Preview
Report Post
Beyond Authentication β€” Exploiting a Nasty IDOR in Profile Update Functionality
infosecwriteups.comΒ·5h
πŸ”“Hacking
Preview
Report Post
Before Bitcoin: The Forgotten P2P Dreams that Sparked Crypto
hackernoon.comΒ·1d
🌐IPFS
Preview
Report Post
D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning
arxiv.orgΒ·1d
🀐Secure Multiparty
Preview
Report Post
Seven Cybersecurity Tips for 2026 No One Will Tell You About
cacm.acm.orgΒ·17h
🎯Threat Hunting
Preview
Report Post
What Is HTTPS and Why Is It Essential for Cybersecurity?
securityscorecard.comΒ·20h
🌐Network Security
Preview
Report Post
YubiKey FIPS Series named sole authenticator authorized to hold both DoD PKI and FIDO2 passkeys
yubico.comΒ·1d
πŸ”’Hardware Attestation
Preview
Report Post
Digital Forensics Round-Up, December 10 2025
forensicfocus.comΒ·2d
πŸ”Audio Forensics
Preview
Report Post
IDA Pro String Heuristics
gabrielcybersecurity.comΒ·1d
βœ…Format Verification
Preview
Report Post
ActivID administrator account takeover : the story behind HID-PSA-2025-002
synacktiv.comΒ·1d
πŸ“‘DNS Archaeology
Preview
Report Post
Following the digital trail: what happens to data stolen in a phishing attack
securelist.comΒ·1d
πŸ“‘Feed Security
Preview
Report Post
Building Trustworthy AI Agents
schneier.comΒ·1dΒ·
Discuss: Lobsters
πŸ”’Language-based security
Preview
Report Post
Part 2 | Open Infrastructures: Control
openpreservation.orgΒ·1d
🌐Edge Preservation
Preview
Report Post
HTTPS certificate industry phasing out less secure domain validation methods
security.googleblog.comΒ·2dΒ·
🌐DNS Security
Preview
Report Post
Rich Headers: leveraging this mysterious artifact of the PE format
virusbulletin.comΒ·3hΒ·
Discuss: Hacker News
🏺Format Archaeology
Preview
Report Post
10 Years of Let's Encrypt Certificates
letsencrypt.orgΒ·4d
πŸ”Certificate Analysis
Preview
Report Post
Security by Design: Lessons from API Days Paris 2025
dev.toΒ·20hΒ·
Discuss: DEV
πŸ›‘οΈeBPF Security
Preview
Report Post
Hackers are pretending to be cops – and tech companies keep falling for it
techspot.comΒ·18h
πŸ”“Hacking
Preview
Report Post
Let’s Encrypt Turns Ten
pxlnv.comΒ·2d
πŸ”Archive Encryption
Preview
Report Post
exploits.club Weekly(ish) Newsletter 93 - Old QEMU Bugs, Android Auto Bluetooth PoCs, BeeStation P20, and More
blog.exploits.clubΒ·1d
πŸ’£ZIP Vulnerabilities
Preview
Report Post