Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1h
🔐Cryptographic Archaeology
My First Contribution to Linux
vkoskiv.com·1h·
📺VT100 Emulation
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·9h
🔧Hardware Verification
Valuable News – 2025/10/06
vermaden.wordpress.com·10h
🔌Operating system internals
This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model
hackaday.com·2d
🛡️eBPF Security
Harden Windows Safely, Securely, Only with Official Microsoft Methods
hotcakex.github.io·13h·
Discuss: Hacker News
🔒Secure Boot
Public Key Infrastructure with Secure Shell
free-pmx.org·1d·
Discuss: r/homelab
🎯NTLM Attacks
rblhost: Exploring Rust’s Role in Embedded Development Tools
mcuoneclipse.com·19h
🦀Embedded Rust
I reviewed the GMKtec NucBox M6 Ultra - and this mini PC has serious potential for the price
techradar.com·46m
🔌Operating system internals
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·5h
🎫Kerberos Exploitation
1GHz Renesas RA8T2 Cortex-M85 MCUs feature MRAM and EtherCAT for industrial motor control
cnx-software.com·13h
🦾ARM Cortex-M
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.pro·7h·
Discuss: Hacker News
💨Cache Optimization
Breaking Into HackTheBox: My Journey from Script Kiddie to Root
infosecwriteups.com·6h
🔓Hacking
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·18h·
Discuss: Hacker News
🛡️WASM Security
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·1d
🛡Cybersecurity
I have created a tutorial on how to install Mint with BTRFS and Full Disk Encryption!
gist.github.com·15h·
Discuss: r/linux
🔒Secure Boot
Metasploit Wrap-Up 10/03/2025
rapid7.com·2d
🛡️CLI Security
Linux 6.18 Adds Two New x86 Platform Drivers, New AMD PMF Capabilities
phoronix.com·3h
🖥️Modern Terminals
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.com·1d
🔍eBPF
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·22h·
Discuss: Hacker News
🔐PKI Archaeology