Cyberattacks' harm to universities is growing โ€” and so are their effects on research
nature.comยท1d
๐Ÿ›กCybersecurity
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท21h
๐Ÿ”“Hacking
Flag this post
Rybbit โ€“ The Modern Open Source Google Analytics Replacement
rybbit.comยท6hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Flag this post
Cypherpunks Hall of Fame
github.comยท3dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post
Your organizationโ€™s top 4 data protection best practices
proton.meยท3d
๐Ÿ”Archive Encryption
Flag this post
Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025
bitsight.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
What organisations can learn from the record breaking fine over Capitaโ€™s ransomware incident
doublepulsar.comยท2d
๐ŸŽซKerberos Attacks
Flag this post
How to Long Game
ystrickler.comยท4hยท
Discuss: Hacker News
โฌœMinimalism
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.comยท2d
๐Ÿ”Quantum Security
Flag this post
Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan
dev.toยท3hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Flag this post
Hyper-Secure Code Generation via Lattice-Based Homomorphic Encryption & AI-Assisted Verification
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Homomorphic Encryption
Flag this post
LLMs grooming, LLM-powered chatbot references to Kremlin disinformation
misinforeview.hks.harvard.eduยท15hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Flag this post
Management Pseudo-Science
laser-coder.netยท16hยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Flag this post
Rhadamanthys Loader Deobfuscation
cyber.wtfยท3d
๐ŸงชCBOR Fuzzing
Flag this post
Agartha: History of a Meme
vishalblog.substack.comยท2hยท
Discuss: Substack
๐Ÿ›Digital humanities
Flag this post
Data Exfiltration in Claude for Excel
promptarmor.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Enoch, a date-prediction AI-model, trained on C14-dated scroll samples
journals.plos.orgยท3dยท
Discuss: Hacker News
๐Ÿค–Paleography Automation
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.meยท2d
๐Ÿ”Archive Encryption
Flag this post
A Comprehensive Study on Cyber Attack Vectors in EV Traction Power Electronics
arxiv.orgยท2d
๐Ÿ”ฌHardware Forensics
Flag this post