Compositional Interface Refinement Through Subtyping in Probabilistic Session Types
arxiv.org·13h
📞Session Types
Secret Service dismantles telecom threat around UN capable of crippling cell service in NYC
the-independent.com·6h
🕵️Network Forensics
Artificial Intelligence in Networking Research in the Arab World
cacm.acm.org·22h
🕸️Mesh Networking
Running a Linux Router on macOS
amodm.com·30m·
Discuss: Hacker News
🍎XNU Internals
Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques
cyberscoop.com·20h
🎯Threat Hunting
New methods and standardization in chemical forensics
phys.org·22h
🔎OSINT Techniques
Automated TLS Session Key Derivation Hardening via Dynamic Entropy Estimation
dev.to·7h·
Discuss: DEV
🔐Cryptographic Archaeology
Your Vulnerability Scanner Might Be Your Weakest Link
praetorian.com·23h
🎯NTLM Attacks
Criminals are driving fake cell towers through cities to blast out scam texts
techspot.com·13h·
Discuss: r/technews
📡Feed Security
rpki-client 9.6 released
bsdsec.net·1d
🏺ZIP Archaeology
Wireless Blind Spots: The Hidden Risk to AI Data
bastille.net·1h
📊Homelab Monitoring
How We Cut Telemetry Queries to Under 10 Milliseconds
thenewstack.io·1d
🌊Stream Processing
Building unique, per-customer defenses against advanced bot threats in the AI era
blog.cloudflare.com·3h
🎯Threat Hunting
APNIC / FIRST Security 1 at APNIC 60
blog.apnic.net·15h
🕵️Penetration Testing
Proton VPN’s no-logs policy annual external audit
protonvpn.com·1h
🛡️eBPF Security
Tackling the Top CWEs from CISA’s KEV List with Oligo | Oligo Security
oligo.security·23h
🎫Kerberos Exploitation
Meshtastic 64 - A meshtastic radio for the Commodore 64 (64jim64.blogspot.com)
64jim64.blogspot.com·14h
🕹️Retro Gaming
The Database Zoo: SQL, NoSQL, and the Rise of Specialized Engines
hackernoon.com·15h
🏺Database Archaeology
US Secret Service dismantled covert communications network near the U.N. in New York
securityaffairs.com·2h
🛡Cybersecurity
Crypto Miner in hotio/qbittorrent
apogliaghi.com·6h·
📦Container Security