Zero Trust becomes the foundation of cyber security
militaryaerospace.comยท23hยท
Discuss: Hacker News
๐Ÿ”“Hacking
A Man Spent 6 Years Searching the Same Farmโ€”and Finally Discovered a 1,900-Year-Old Roman Treasure
popularmechanics.comยท7h
๐ŸบKerberos Archaeology
Delusions of a Protocol
jwz.orgยท20h
๐Ÿ›ฃ๏ธBGP Hijacking
Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท1dยท
๐Ÿ“ŠHyperLogLog
Inside the 'Trinity of Chaos': How young hackers are uniting to hit big companies
abc.net.auยท19h
๐Ÿ”“Hacking
Variational Secret Common Randomness Extraction
arxiv.orgยท2d
๐ŸงฎKolmogorov Complexity
Swedes stock up on food as fears of war deepen
thelocal.seยท1d
๐Ÿ‡ธSweden
Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users
cybereason.comยท18h
๐ŸงฌPostgreSQL Forensics
Python PEP 636 โ€“ Structural Pattern Matching: Tutorial
peps.python.orgยท9hยท
Discuss: Hacker News
๐Ÿ“Concrete Syntax
sopass and cross-device syncing in a password manager
blog.liw.fiยท1d
๐Ÿ”€CRDT
On This Day in Math - October 5
pballew.blogspot.comยท14hยท
๐Ÿ“œManuscript Algebras
From oil to gemstones: Our shifting understanding of the value of data
ipkitten.blogspot.comยท7hยท
๐Ÿ”Vector Forensics
Dimensional Analysis in Programming Languages (2018)
gmpreussner.comยท48mยท
Discuss: Hacker News
๐ŸงฎAlgebraic Datatypes
Dotenvx โ€“ A Secure Dotenv
dotenvx.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
The State of Security Protocols in Agent 2 Agent(A2A) Systems.
dev.toยท14hยท
Discuss: DEV
๐Ÿ”Capability Systems
Best infosec-related long reads for the week of 9/27/25
metacurity.comยท1d
๐Ÿ›กCybersecurity
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.meยท2d
๐Ÿ”งBinary Parsers
40 Years of Freedom
jxself.orgยท1d
๐Ÿ”Capability Systems
Building a Command-Line Quiz Application in R
towardsdatascience.comยท5h
๐ŸšShell Calculus