Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท5hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Preventing Internet Route Hijack with SIDRops Technology
ietf.orgยท2d
๐Ÿ›ฃ๏ธBGP Hijacking
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
EDR for AI agent workloads, what would it actually look like?
reddit.comยท6hยท
Discuss: r/kubernetes
๐Ÿ”eBPF
Scientists May Have Decoded the Mysterious Language of a Lost City
popularmechanics.comยท6h
๐Ÿ—๏ธPaleocryptography
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
How I found an unauthenticated goldmine of PII
infosecwriteups.comยท7h
๐Ÿ”“Hacking
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.comยท1d
๐ŸŒNetwork Security
Att&Df: Update the Operating System's "Dead Drop"
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
QUIC! Jump to User Space!
hackaday.comยท3h
๐ŸŒNetwork Protocols
HTTP/1.1 must die: Dafydd Stuttard on what this means for enterprise security
portswigger.netยท1d
๐Ÿ“กBGP Archaeology
Wireshark 4.6: New functions for encrypted data
heise.deยท8h
๐Ÿ•ต๏ธNetwork Forensics
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics
Building a VHF / LoRa APRS Bridge | F4FXL
f4fxl.orgยท8h
๐Ÿ“ปHomebrew Protocols
Building A Real-Time Communication System Using Go and WebSocket
dev.toยท2hยท
Discuss: DEV
๐ŸŒWebSocket Framing
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.orgยท4h
๐Ÿ”“Hacking
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท8h
๐ŸšจIncident Response
Phishing Protection: Tools SOC Teams Trust in 2025 โ€“ An Ultimate Guide
vmray.comยท2d
๐ŸŽฏThreat Hunting
Is the End of Detection-Based Security Here?
thenewstack.ioยท3h
๐ŸŽฏThreat Hunting