Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Why ‘security as by-product’ is no replacement for modern tooling
reversinglabs.com·1d
🔐Capability Systems
The Power of Professional Certification
hackster.io·1d
🗺️Competency Maps
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·11h·
Discuss: Hacker News
🎯Threat Hunting
The Importance of Email Security
securityscorecard.com·6h
🎯Threat Hunting
Show HN: An open-source starter kit for implementing OWASP ASVS 5.0
github.com·2h·
Discuss: Hacker News
🔓Open Source Software
“Written by Humans, Not AI” badges
rubenerd.com·1d
🚀Indie Hacking
Passware Kit Mobile 2025v4 Enhances Decryption Of Unisoc-Based Devices
forensicfocus.com·1d
🔒Hardware Attestation
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·7h
🔓Hacking
Product comparison: Detectify vs. Tenable
blog.detectify.com·14h
🎯Threat Hunting
Take Note: Cyber-Risks With AI Notetakers
darkreading.com·1d
🎫Kerberos Attacks
Hardening SSH with Touch-Verified Hardware Keys
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·22h·
Discuss: Hacker News
🔢Reed-Solomon Math
Experimenting with ACL2 and Claude Code
mikedodds.org·10h·
Discuss: Hacker News
👑Isabelle
How did a 2nd Century Roman headstone wind up in New Orleans?
prcno.org·16h·
Discuss: Hacker News
📚Documentation Archaeology
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
Discord says 70,000 photo IDs compromised in customer service breach
theregister.com·1d
🔤EBCDIC Privacy
New Articles: Journal of Contemporary Archival Studies
archivespublishing.com·1d
⚖️Archive Ethics
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·8h
🔓Hacking
GPT-5 for AI-assisted discovery
johndcook.com·7h
🎯Performance Proofs