Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท1dยท
๐Ÿ“ŠHyperLogLog
Detecting DLL hijacking with machine learning: real-world cases
securelist.comยท2h
๐ŸŽซKerberos Exploitation
Breaking Into HackTheBox: My Journey from Script Kiddie to Root
infosecwriteups.comยท3h
๐Ÿ”“Hacking
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.eduยท5d
๐Ÿ”NTLM Archaeology
ELA-1534-1 freeipa security update
freexian.comยท1d
๐ŸŽซKerberos Exploitation
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท15hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Security Affairs newsletter Round 544 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท22h
๐Ÿ›กCybersecurity
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.orgยท6h
๐Ÿ”งHardware Verification
A History of Active Directory Security
adsecurity.orgยท2d
๐ŸบKerberos Archaeology
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.comยท1d
๐Ÿ”eBPF
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท18hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Public Key Infrastructure with Secure Shell
free-pmx.orgยท1dยท
Discuss: r/homelab
๐ŸŽฏNTLM Attacks
Plugin Secure
rya.ncยท1dยท
Discuss: Hacker News
โœ…Checksum Validation
Unity game engine: vulnerability threatens Android, Linux, macOS and Windows
heise.deยท25m
๐Ÿ”“Hacking
While you were partying with your Steam Deck, GPD studied the cord
theverge.comยท32m
๐ŸŽฎGameboy Emulation
Optimizing a QuickTake Image Decoder for the Apple IIโ€™s 6502
hackaday.comยท17h
๐ŸŽApple II Heritage
Clop crew hits Oracle E-Business Suite users with fresh zero-day
theregister.comยท37mยท
Discuss: Hacker News
๐Ÿ”“Hacking
6th October โ€“ Threat Intelligence Report
research.checkpoint.comยท48m
๐Ÿ›กCybersecurity
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.toยท6hยท
Discuss: DEV
๐Ÿ“Code Metrics