A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·11h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.com·10h·
👑RISC-V Privilege
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Unusual circuits in the Intel 386's standard cell logic
righto.com·15h·
Circuit Archaeology
Flag this post
Dell PowerEdge R930 DDR4/DDR3 memory configuration question
reddit.com·49m·
Discuss: r/homelab
Hardware Transactional Memory
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.com·13h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
[SYSS-2025-059]: Dell computer UEFI boot protection bypass
seclists.org·3d
🔒Secure Boot
Flag this post
No Deus ex Machina
thestoicprogrammer.substack.com·23h·
Discuss: Substack
🔩Systems Programming
Flag this post
Building Tornago: A Go Library for Tor Integration Born from Fraud Prevention Needs
dev.to·1h·
Discuss: DEV
🧅Tor Networks
Flag this post
Show HN: GuardiAgent – Sandboxing / permission model for MCP servers
guardiagent.com·1d·
Discuss: Hacker News
🛡️CLI Security
Flag this post
RISC-V Testing Lapse Resulted In Wrong MIPS RISC-V Vendor ID Landing In Linux 6.18
phoronix.com·9h
🧪RISC-V Fuzzing
Flag this post
Metasploit Wrap-Up 11/21/2025
rapid7.com·1d
🛡️CLI Security
Flag this post
Copackaged optics have officially found their killer app - of course it's AI
theregister.com·22h
🖥️Modern Terminals
Flag this post
Building a Process Injection Detector in Rust
github.com·1d·
🔍eBPF
Flag this post
System Security Adversarial Capability Eval of iOS, Android, HarmonyOS (2024)
darknavy.org·4d·
Discuss: Hacker News
🔐Systems Hardening
Flag this post
eBPF Rootkit
synacktiv.com·14h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
Rhadamanthys Loader Deobfuscation
cyber.wtf·3d
🧪CBOR Fuzzing
Flag this post
Securing the Win: What Cybersecurity Can Learn From the Paddock
darkreading.com·2d
💾Persistence Strategies
Flag this post