Key Takeaways from the Safety Critical Track at Open Source Summit Europe 2025 โ€“ 3
elisa.techยท1d
๐Ÿ”“Open Source Software
OpenSSF Scorecard Audit is Complete!
ostif.orgยท1d
๐Ÿ•ต๏ธPenetration Testing
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
SSH Security: Why You Should Touch to Verify
ubicloud.comยท18hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.comยท3d
๐Ÿ“ฆContainer Security
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.securityยท1d
๐Ÿ›ก๏ธeBPF Security
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.comยท5h
๐ŸŽซKerberos Attacks
The Bit Shift Paradox: How "Optimizing" Can Make Code 6ร— Slower
hackernoon.comยท2d
๐ŸงฎCompute Optimization
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)
isc.sans.eduยท1d
๐Ÿฆ Malware Analysis
InferenceMAX โ€“ open-source Inference Frequent Benchmarking
github.comยท6hยท
Discuss: Hacker News
โšกPerformance Mythology
The Linus Method: How we simiplifed RFC reviews
devashish.meยท9hยท
Discuss: Hacker News
โš™๏ธProof Engineering
Hacking the Humane AI Pin
writings.agg.imยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธARM TrustZone
The Chip That Spoke Lisp
jxself.orgยท3d
๐Ÿค–Lisp Machines
Activation Alchemist: Sculpting Stability with Functional Signatures
dev.toยท6hยท
Discuss: DEV
๐Ÿ”Concolic Testing
Panther Lake notebook processor: Better e-cores, new GPU, big question marks
heise.deยท1d
๐Ÿ–ฅ๏ธHardware Architecture
A new breed of analyzers
daniel.haxx.seยท14hยท
๐Ÿ›Fuzzing
Intel's Open-Source Strategy Is Changing At Odds With The Ethos Of Open-Source
phoronix.comยท1dยท
๐ŸงฒRISC-V Archaeology
Experimenting with ACL2 and Claude Code
mikedodds.orgยท14hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
Unsure what to do as lab has grown
reddit.comยท2hยท
Discuss: r/homelab
๐Ÿ–ฅHome Lab Setup