Secrets Hackers Don’t Tell: Recon Techniques That Actually Pay
infosecwriteups.comΒ·6h
πŸ•΅οΈVector Smuggling
Russia rains drones and missiles on Ukraine as Poland scrambles aircraft
japantimes.co.jpΒ·14h
πŸ‡΅πŸ‡±Polish Odra
Fun with HyperLogLog and SIMD
vaktibabat.github.ioΒ·1dΒ·
πŸ“ŠHyperLogLog
Expert: Europe should wage information warfare inside Russia
sverigesradio.seΒ·2d
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.comΒ·2h
πŸ›‘Cybersecurity
A simple way to encrypt sensitive data using python
dev.toΒ·23hΒ·
Discuss: DEV
πŸ”Soviet Cryptography
On This Day in Math - October 5
pballew.blogspot.comΒ·9hΒ·
πŸ“œManuscript Algebras
Poland accuses Russia of attack plot involving explosives smuggled in corn tins
euronews.comΒ·2d
πŸ›οΈEastern European Computing
Satellite Warfare – An Analysis
digitalforensicsmagazine.comΒ·1d
🎯Threat Hunting
The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.comΒ·2d
βš”οΈLean Theorem
A Man Spent 6 Years Searching the Same Farmβ€”and Finally Discovered a 1,900-Year-Old Roman Treasure
popularmechanics.comΒ·1h
🏺Kerberos Archaeology
In the Fourth Person
nybooks.comΒ·3d
πŸ‡΅πŸ‡±Polish Assembly
Public Key Infrastructure with Secure Shell
free-pmx.orgΒ·12hΒ·
Discuss: r/homelab
🎯NTLM Attacks
Infinite Footguns: Writing a JavaScript Interpreter in JavaScript
scour.ingΒ·14h
⚑Proof Automation
Uncanny academic valley: Brian Wansink as proto-chatbot
statmodeling.stat.columbia.eduΒ·35m
πŸ”²Proof Irrelevance
Russian drones and missiles bombard Ukrainian city of Lviv
theguardian.comΒ·4h
πŸ‡΅πŸ‡±Polish Computing
Zero Trust becomes the foundation of cyber security
militaryaerospace.comΒ·17hΒ·
Discuss: Hacker News
πŸ”“Hacking
ELA-1534-1 freeipa security update
freexian.comΒ·3h
🎫Kerberos Exploitation