Internet in Spaaaaace
blog.apnic.netΒ·1h
πŸ“‘Network Protocol Design
Flag this post
OnionWatch: Monitor Sites Inside the Tor Network and Beyond
onionwatch.appΒ·1dΒ·
Discuss: Hacker News
🌐WARC Forensics
Flag this post
Internet/Network Resilience
i.redd.itΒ·1dΒ·
Discuss: r/homelab
πŸ•ΈοΈMesh Networks
Flag this post
Automated RPKI Certificate Revocation Validation via Graph Neural Networks and Temporal Logic
dev.toΒ·1dΒ·
Discuss: DEV
🌐NetworkProtocols
Flag this post
Algorithmic outreach can lead to information inequality
phys.orgΒ·11h
πŸ•ΈοΈNetwork Topology
Flag this post
Notorious Chinese hacking group Salt Typhoon found lurking in European comms networks
techradar.comΒ·12h
🌐Network Security
Flag this post
How IGP Leaks Put IXP Route Servers in the DDoS Shooting Range
labs.ripe.netΒ·18h
πŸ›£οΈBGP Hijacking
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.coΒ·1h
πŸ›‘οΈeBPF Security
Flag this post
Bitcoin Mesh Networks
63sats.comΒ·2dΒ·
Discuss: Hacker News
πŸ•ΈοΈMesh Networks
Flag this post
The evolving landscape of email phishing attacks: how threat actors are reusing and refining established techniques
securelist.comΒ·15h
πŸ”“Hacking
Flag this post
Taking stock of Big Tech: the 2025 RDR Index
accessnow.orgΒ·5h
βš–οΈEmulation Ethics
Flag this post
When Models Manipulate Manifolds: The Geometry of a Counting Task
transformer-circuits.pubΒ·8hΒ·
Discuss: Hacker News
πŸŒ€Differential Geometry
Flag this post
Thematic Consistency
systemsapproach.orgΒ·1d
πŸ“‘Network Protocol Design
Flag this post
International Sting Takes Down SIM Box Criminal Network
darkreading.comΒ·1d
🎫Kerberos Exploitation
Flag this post
Robocalling task force bill advances in Senate
cyberscoop.comΒ·5h
πŸ“»Homebrew Protocols
Flag this post
The Synthient Threat Data
troyhunt.comΒ·6hΒ·
Discuss: Hacker News
πŸ”“Password Cracking
Flag this post
What Are RFCs? The Forgotten Blueprints of the Internet
ackreq.github.ioΒ·2dΒ·
Discuss: Hacker News
πŸ“‘BGP Archaeology
Flag this post
Ransomware Unleashed: Insight into the 2025 Threat Surge
medium.comΒ·1d
🎯Threat Hunting
Flag this post
When and Why Data Centers Should Implement Wireless Threat Detection
bastille.netΒ·6h
πŸ“ŠHomelab Monitoring
Flag this post