Research Worth Reading Week 44/2025
pentesterlab.com·2d
🇸🇪Nordic Cryptography
Flag this post
Consumer tip: Meeting people online? Watch out for scammers
mercurynews.com·1d
📡Feed Security
Flag this post
Show HN: Database of 58 AI-Powered Microsoft 365 Email Security Vendors
🕵️Domain Enumeration
Flag this post
3. Show HN: AI-powered sponsorship platform (proposals, research, mockups)
🌊Streaming Systems
Flag this post
Insomnia 12: Kong enhances API tool with MCP support and AI assistance
heise.de·8h
🔌Interface Evolution
Flag this post
Show HN: JobsAndAI – Personalized career risk analysis for AI disruption
🗺️Competency Maps
Flag this post
Synthetic α-synuclein fibrils replicate in mice causing MSA-like pathology
nature.com·24m
🧬Copy Number Variants
Flag this post
Redefining Enterprise Data Strategy: Srinivasa Kavikondala’s Leadership in AI-Driven Architecture
hackernoon.com·12h
🏛️OAIS Implementation
Flag this post
A new SQL-powered permissions system in Datasette 1.0a20
simonwillison.net·20h
🏺Database Archaeology
Flag this post
Patchday: Critical malicious code vulnerability in Android 13, 14, 15, 16 closed
heise.de·1d
🔓Hacking
Flag this post
Toward Hybrid COTS-based LiFi/WiFi Networks with QoS Requirements in Mobile Environments
arxiv.org·1d
🕸️Mesh Networking
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·6d
🎯NTLM Attacks
Flag this post
Cybercrooks team up with organized crime to steal pricey cargo
theregister.com·2d
🕵️Vector Smuggling
Flag this post
Building a Writing Tool Taught Me More About Explaining Ideas Than I Expected
🌳Incremental Parsing
Flag this post
DOJ Accuses US Ransomware Negotiators of Launching Their Own Ransomware Attacks
yro.slashdot.org·1d
🎫Kerberos Attacks
Flag this post
Loading...Loading more...