Three security invariants could prevent 65% of preaches
blog.apnic.net·3d
🔓Hacking
Flag this post
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
arxiv.org·2d·
Discuss: Lobsters
🧪CBOR Fuzzing
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·10h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
Nuclear Orphans: Europe and the Folding of the American Nuclear Umbrella
americanaffairsjournal.org·2d
🔐Quantum Security
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·2d
🔎OSINT Techniques
Flag this post
Misleading PDF: visual content differs from extracted text
czterycztery.pl·1h·
Discuss: Hacker News
📜Text Collation
Flag this post
Note
hsu.cy·1d
📲Digitization
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
phys.org·20h
🗝️Paleocryptography
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.com·1d
📜Family History Data
Flag this post
The Limits of Formal Security Models – Dorothy E. Denning (1999)
faculty.nps.edu·3d·
Discuss: Hacker News
🔒WASM Capabilities
Flag this post
A Comprehensive Study on Cyber Attack Vectors in EV Traction Power Electronics
arxiv.org·2d
🔬Hardware Forensics
Flag this post
Weekly Update 479
troyhunt.com·2h
🔒Privacy Archives
Flag this post
eBPF Rootkit
synacktiv.com·13h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
Human risk: don’t blame the victim, fix the system
techradar.com·1d
🔓Hacking
Flag this post
All warfare is information warfare
shakeddown.substack.com·23h·
Discuss: Substack
🔲Cellular Automata
Flag this post
Heimdal 5.1.0 RC Dashboard: Smarter Automation, Stronger Compliance, and Smoother Control
heimdalsecurity.com·1d
🐚Nordic Shell
Flag this post
The Censorship Network: Regulation and Repression in Germany Today
liber-net.org·10h·
Discuss: Hacker News
🧅Tor Networks
Flag this post
Charter of Democratic Pansystemism:Replacing the Constitution with Cybernetics [pdf]
files.catbox.moe·3h·
Discuss: Hacker News
📖Nordic Typography
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·20h
🔓Hacking
Flag this post