Open Source AI
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Capability Systems
Don't Let Your Mocks Mock You
revontulet.devยท3hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Why (special agent) Johnny (still) Can't Encrypt (2011)
mattblaze.orgยท3hยท
Discuss: Lobsters
๐ŸŒŠStream Ciphers
OpenSSF Experts Weigh in on CISAโ€™s SBOM Minimum Elements Update
thenewstack.ioยท6h
โ„๏ธNix Adoption
Zeroโ€‘Day Attack Prevention: How to Prepare
securityscorecard.comยท5h
๐Ÿ”“Hacking
Why sandboxing matters now โ€” and how to choose one that gives you facts, not fiction
vmray.comยท2d
๐Ÿ”’WASM Capabilities
9 Best Practices for API Security โš”๏ธ
newsletter.systemdesign.oneยท13h
โšกgRPC
The Capability-Tractability Tradeoff (2023)
buttondown.comยท1hยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Software Bill of Materials Requirements in DoD and Federal Guidance
eclypsium.comยท5hยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Cyber Essentials Explained โ€“ And How Heimdal Helps You Pass and Stay Compliant
heimdalsecurity.comยท9h
๐Ÿ”’Secure Boot
Server Upgrade Suggesions
reddit.comยท6hยท
Discuss: r/homelab
๐Ÿ–ฅ๏ธModern CPU
Trusting builds with Bazel remote execution
blogsystem5.substack.comยท7hยท
Discuss: Substack
๐Ÿ›ก๏ธWebAssembly Security
Invisible Dependencies, Visible Damage: The Case for Supply Chain Hygiene
puri.smยท13h
๐Ÿ”—Supply Chain
Patch now! Attacks on SonicWall firewalls observed again
heise.deยท3h
๐Ÿ”“Hacking
The Security Time Capsule: Evolving Beyond Legacy Pen Testing
praetorian.comยท2d
๐Ÿ”Archive Cryptanalysis
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comยท9h
๐ŸŽซKerberos Exploitation