How to Use a Terminal
πTerminals
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Optical Data Center Security Logs via Graph Neural Networks
π―Threat Hunting
Flag this post
<p>Kind of wish I could say something about the project work I did on today. Truth of the matter is that I’ve been battling Goreleaser for most of the day...
lmika.orgΒ·1h
π§FOSS
Flag this post
Hiding Processes from Ps or Top
π‘οΈCLI Security
Flag this post
Security Affairs newsletter Round 547 by Pierluigi Paganini β INTERNATIONAL EDITION
securityaffairs.comΒ·9h
π‘Cybersecurity
Flag this post
Looking for TEMPer hardware data
βοΈDIY Electronics
Flag this post
Ken Thompson Recalls Unixβs Rowdy, Lock-Picking Origins
thenewstack.ioΒ·35m
πΎvintage computing
Flag this post
Could you be a traitor? Psychologist reveals how to lie and get away with it
the-independent.comΒ·4h
π³οΈInformation Leakage
Flag this post
A Practical Tour of How Code Runs: Binaries, Bytecode and Shared Libraries
π©Systems Programming
Flag this post
Ralf Brown's Files (The x86 Interrupt List)
πΊVT100
Flag this post
Digital Forensics Round-Up, October 22 2025
forensicfocus.comΒ·3d
π¬Archive Forensics
Flag this post
Prompt injection to RCE in AI agents
π‘οΈCLI Security
Flag this post
Even the easiest data requests can require some effort
statmodeling.stat.columbia.eduΒ·23h
πAcademic Torrents
Flag this post
exploits.club Weekly Newsletter 90 - Fuzzing Rust Subsystems, Pwn2Own Near Misses, Linux 1-Days, And More
blog.exploits.clubΒ·2d
πHacking
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.coΒ·4d
π‘οΈeBPF Security
Flag this post
Last Week on My Mac: Why Spotlight canβt find some files
eclecticlight.coΒ·5h
πApple Archive
Flag this post
The Emergence of Cognitive Intelligence (COGINT) as a New Military Intelligence Collection Discipline
tandfonline.comΒ·1d
π§ Intelligence Compression
Flag this post
Best infosec-related long reads for the week of 10/18/25
metacurity.comΒ·1d
π‘Cybersecurity
Flag this post
Intelligence Insights: October 2025
redcanary.comΒ·2d
π‘Feed Security
Flag this post
Loading...Loading more...