North Korean threat actors use JSON sites to deliver malware via trojanized code
securityaffairs.com·5h
🔓Hacking
Flag this post
CLUE: Controllable Latent space of Unprompted Embeddings for Diversity Management in Text-to-Image Synthesis
arxiv.org·11h
🧮Vector Embeddings
Flag this post
How LLMs Could Use Their Own Parameters to Hide Messages
spylab.ai·1h·
Discuss: Hacker News
💻Local LLMs
Flag this post
Why our own clicks are often cybercrime's greatest allies
techradar.com·6h
🔓Hacking
Flag this post
Industry Spotlight: QuSecure’s Dave Krauthamer on Post-Quantum Security
telecomramblings.com·7h
🔐Quantum Security
Flag this post
A sub $5,000 intercepter drone?
aardvark.co.nz·23h
⚙️Tape Transport
Flag this post
Surveillance tech provider Protei was hacked, its data stolen and its website defaced
techcrunch.com·3h
🔓Hacking
Flag this post
Oblique Strategies: Prompts for Programmers
kevinlawler.com·22h·
Discuss: Lobsters
⚔️Lean Tactics
Flag this post
Unlocking the Potential of Raw Data Analysis in OSINT
dutchosintguy.com·6h
🔎OSINT Techniques
Flag this post
Best-in-Class GenAI Security: When CloudGuard WAF Meets Lakera
blog.checkpoint.com·4h
🏠Homelab Pentesting
Flag this post
Scammers are sending bogus copyright warnings to steal your X login
malwarebytes.com·2h
🏴‍☠️Piracy
Flag this post
Robust peak detection algorithm using z-scores
stackoverflow.com·18h·
Discuss: Hacker News
🌊Digital Signal Processing
Flag this post
SoK: Blockchain Oracles Between Theory and Practice
eprint.iacr.org·9h·
Discuss: Hacker News
🤝Consensus Algorithms
Flag this post
K-anonymity, the parent of all privacy definitions
desfontain.es·4h·
🔒Privacy Archives
Flag this post
Hackers steal maternity ward CCTV videos in India cybercrime racket
bbc.com·16h
🔓Hacking
Flag this post
An AI By Any Other Name
hackaday.com·1d
🎙️Whisper
Flag this post
Tradeoffs in System Security
systemsapproach.org·9h
🌐NetworkProtocols
Flag this post
Tp-Link Router Deep Research
r0keb.github.io·2d
Circuit Archaeology
Flag this post
Educational Byte: What Hardware Devices Do You Need to Use Crypto?
hackernoon.com·7h
🔗Hash Chains
Flag this post
Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT
unit42.paloaltonetworks.com·2d·
Discuss: r/SecOpsDaily
🎫Kerberos Attacks
Flag this post