Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.to·2d·
Discuss: DEV
🧪Binary Fuzzing
Use mutation testing to find the bugs your tests don't catch
blog.trailofbits.com·12h
🧪Property-Based Testing
Infinite payloads? The future of API Testing with dynamic fuzzing
blog.detectify.com·14h
🧪Binary Fuzzing
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
portswigger.net·1d
🌐NetworkProtocols
What I learned building a programming language with LLM agents
eddmann.com·6h·
Discuss: Hacker News
🗣️Domain-Specific Languages
The huge AI security hole
aardvark.co.nz·6h
🔓Hacking
HTB Sherlocks: Meerkat Walkthrough
infosecwriteups.com·15h
🎫Kerberos Exploitation
Design Tradeoffs at the Edge
usenix.org·2h·
Discuss: Hacker News
🌐DNS over QUIC
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.org·6h·
Discuss: Hacker News
🔐Capability Systems
How to join the desync endgame: Practical tips from pentester Tom Stacey
portswigger.net·7h
🛣️BGP Hijacking
How AI coding tools can learn to develop secure software
reversinglabs.com·1d
Proof Automation
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381
tenable.com·1d
🌐DNS Security
Issue 490
haskellweekly.news·11h
🔗Functional Compilers
Analysis of the ROGUE Agent-Based Automated Web Testing System
dev.to·2h·
Discuss: DEV
Proof Automation
Developers under attack is the new black
boostsecurity.io·6h
💣ZIP Vulnerabilities
Study cautions that monitoring chains of thought soon may no longer ensure genuine AI alignment
the-decoder.com·6h
🎯Threat Hunting
Rspamd 3.13 Launches with Redis-Backed Multiclass Bayes
linuxiac.com·9h
🧪CBOR Fuzzing
How weak passwords and other failings led to catastrophic breach of Ascension
arstechnica.com·9h·
🏺Kerberos Archaeology
The Self-Betrayal Heuristic (SBH): A Simple Test for AI Misalignment
news.ycombinator.com·1h·
Discuss: Hacker News
🎯Threat Hunting
Pleasant Imperative Program Proofs with GallinaC
arxiv.org·1d
⚔️Lean Tactics