011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioยท3d
๐Ÿ”Hash Functions
Flag this post
CAD-3D on the Atari ST
stonetools.ghost.ioยท55mยท
Discuss: Hacker News
๐Ÿ•น๏ธRetro Gaming
Flag this post
Oops, My UUIDs Collided
alexsci.comยท1hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท3h
๐Ÿ”“Hacking
Flag this post
Proton Exposes 300 Million Stolen Credentials โ€” 49% Include Passwords
forbes.comยท20h
๐Ÿ”“Hacking
Flag this post
How to Hack a Poker Game
wired.comยท11h
๐Ÿ“ผCassette Hacking
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท1h
๐Ÿ”“Hacking
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Verification
Flag this post
The internet was made for privacy
doctorow.medium.comยท3h
๐ŸงฒMagnetic Philosophy
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท1dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท7hยท
Discuss: Hacker News
๐Ÿ”NTLM Forensics
Flag this post
Scientists Think This Tasty Snack Could Revolutionize Computing
popularmechanics.comยท7h
โšกHomebrew CPUs
Flag this post
AI scrapers request commented scripts
cryptography.dogยท4hยท
Discuss: Hacker News
๐ŸŒDNS Security
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท11h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comยท1d
๐Ÿ”—Combinatory Logic
Flag this post