Letitia James is the latest target of Donald Trump’s revenge agenda
economist.com·1d
🚨Incident Response
Wireshark 4.6: New functions for encrypted data
heise.de·18h
🕵️Network Forensics
My first homelab project!
i.redd.it·1d·
Discuss: r/homelab
🏠Homelab
Title TBA
usenix.org·23h
📄PostScript
An enough week
blog.mitrichev.ch·1d·
📈Linear programming
Screenshot-proof images via temporal dithering (2012)
blog.persistent.info·1d·
Discuss: Hacker News
🧪Archive Fuzzing
Paper Highlights - Do Password Managers Improve Password Hygiene?
blog.passwordresearch.com·4h·
🔓Password Cracking
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.org·12h·
Discuss: Hacker News
📟Terminal Typography
Announcing coreboot 25.09 release
blogs.coreboot.org·5h
🔌Operating system internals
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·2d
🧪Binary Fuzzing
APRS over LoRa with RNode | unsigned.io
unsigned.io·18h
📻Homebrew Protocols
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·18h
🚨Incident Response
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·4d
🔐Cryptographic Archaeology
I Wrote an Imagemagick Field Guide for Myself, You Might Find It Useful
joeldare.com·16h·
Discuss: Hacker News
📸PNG Optimization
How Platforms (and You) Know If an Image/Video Is AI-Made
michaelgathara.org·3d·
Discuss: Hacker News
🛡️Archive Invariants
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·3d
📦Container Security
Hardware Vulnerability Allows Attackers to Hack AI Training Data – NC State News
news.ncsu.edu·8h·
Discuss: Hacker News
🔐RISC-V Cryptography
Show HN: Nanowakeword – Automates custom wake word model training
github.com·17h·
Discuss: Hacker News
🎙️Whisper
Detecting and Mitigating Insertion Hallucination in Video-to-Audio Generation
arxiv.org·1d
👁️Perceptual Coding