Research Opportunity with Royal Museums Greenwich
dpconline.orgยท2d
๐ŸบComputational Archaeology
October 7 – 10, 2025: Bellingcat Online Workshop (16-hour) [Europe-friendly time]
bellingcat.comยท1d
๐Ÿ Homelab Pentesting
DFIR Next Steps: Suspicious Pulseway Use
cybertriage.comยท2d
๐Ÿ›ก๏ธeBPF Security
A disenshittification moment from the land of mass storage
doctorow.medium.comยท1d
๐ŸงฒMagnetic Philosophy
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.orgยท2d
๐Ÿ›กCybersecurity
The 47-Day Certificate Ultimatum: How Browsers Broke the CA Cartel
certkit.ioยท4dยท
Discuss: DEV, Hacker News
๐Ÿ”Certificate Analysis
Steve Jobs Signed 1988 NExt Inc. Memo Autograph Founder CEO
yourownmuseum.comยท22hยท
Discuss: Hacker News
๐ŸŽApple Computing
The Power of Professional Certification
hackster.ioยท1d
๐Ÿ—บ๏ธCompetency Maps
The Porcelain to Come
stackdiver.comยท14hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Effective Web Scraping with Python: Building a Robust Data Pipeline for Price Monitoring
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ต๏ธFeed Discovery
Hyper-Personalized Cyberbullying Mitigation via Adaptive Linguistic Fingerprinting and Behavioral Anomaly Detection
dev.toยท3hยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
Phones as a Fortress: 4th Amendment Castle Doctrine for the "Digital Home"
computerweekly.comยท19hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Show HN: Prompts to make AI impersonate 10 programming legends
ai-impersonator.blueprintlab.ioยท4hยท
๐ŸŽ™๏ธWhisper
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.orgยท2dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
What's the Role of Trust in AI?
algorithmictradeoff.substack.comยท21hยท
Discuss: Substack
๐Ÿ”ฒCellular Automata
Sync PUBG and Hardware IDs
github.comยท2hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Memgoose โ€“ An In-Memory Mongoose Impersonator
github.comยท3hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Google researchers say Oracle EBR hackers have hit dozens of organizations
techradar.comยท1d
๐ŸŽซKerberos Attacks
Hacking the Humane AI Pin
writings.agg.imยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธARM TrustZone
Sorting encrypted data without decryption: a practical trick
dev.toยท22hยท
Discuss: DEV
๐Ÿ”Hash Functions