eBPF Rootkit
🛡️eBPF Security
Flag this post
AI as Cyberattacker
schneier.com·1d
🔓Hacking
Flag this post
RuBee
computer.rip·7h
📻Homebrew Protocols
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·12h
📼Cassette Hacking
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·9h
λLambda Encodings
Flag this post
Hacker Review of Ghost in the Shell (1995)
🔓Hacking
Flag this post
Nearly $19M Raised Before V1 Protocol Launch, This New Crypto May Be The Safest 2026 Investment
hackernoon.com·9h
🚀Indie Hacking
Flag this post
Olmo 3 is a fully open LLM
simonwillison.net·5h
🌀Brotli Internals
Flag this post
📘 Unsupervised Learning NO. 507
newsletter.danielmiessler.com·3d
📼Cassette Hacking
Flag this post
Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-L...
blog.checkpoint.com·1d
🎫Kerberos Attacks
Flag this post
‘Matrix Push’ C2 Tool Hijacks Browser Notifications for Phishing
darkreading.com·2d
🚀Indie Hacking
Flag this post
Bitsight Threat Intelligence Briefing: Key Malware Trends Shaping Cyber Risk in 2025
bitsight.com·2d
🦠Malware Analysis
Flag this post
Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models
🧪CBOR Fuzzing
Flag this post
Evolution Strategies at the Hyperscale
🔲Cellular Automata
Flag this post
Federal authorities take down criminal network smuggling Nvidia GPUs to China
techspot.com·1d
🇨🇳Chinese Computing
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.com·2d
🔐Quantum Security
Flag this post
Info to decipher secret message in Kryptos sculpture at CIA headquarters sells for close to $1M
phys.org·19h
🗝️Paleocryptography
Flag this post
Mad drunk on the mead of poetry
blog.zarfhome.com·1d
🧪CBOR Fuzzing
Flag this post
Loading...Loading more...