How I found an unauthenticated goldmine of PII
infosecwriteups.com·7h
🔓Hacking
Experimenting with ACL2 and Claude Code
mikedodds.org·6h·
Discuss: Hacker News
👑Isabelle
Three ways formally verified code can go wrong in practice
buttondown.com·1h
📜Proof Carrying Code
The Why of PGP Authentication
articles.59.ca·6h
🔑Cryptographic Protocols
Juniper patched nine critical flaws in Junos Space
securityaffairs.com·5h
🔓Hacking
API Attack Awareness: Injection Attacks in APIs – Old Threat, New Surface
lab.wallarm.com·1d
🔓LDAP Injection
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·5h
🔓Hacking
A new breed of analyzers
daniel.haxx.se·7h·
🐛Fuzzing
Show HN: Comparegpt.io – Trustworthy Mode to reduce LLM hallucinations
news.ycombinator.com·18h·
Discuss: Hacker News
🔍BitFunnel
ChatGPT and other AI models can be ‘poisoned’ to spew gibberish, researchers warn
the-independent.com·2h
🔓Hacking
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·3h
📊Homelab Monitoring
Python Security: What is SAST
nocomplexity.com·1d
🕵️Penetration Testing
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics
The Linus Method: How we simiplifed RFC reviews
devashish.me·2h·
Discuss: Hacker News
⚙️Proof Engineering
HTTP/1.1 must die: Dafydd Stuttard on what this means for enterprise security
portswigger.net·1d
📡BGP Archaeology
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
Getting Started with AI Hacking Part 2: Prompt Injection
blackhillsinfosec.com·2d
🕵️Vector Smuggling
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4d
🔐Cryptographic Archaeology
InfoSec News Nuggets 10/10/2025
aboutdfir.com·3h
🔓Hacking