October 28 – 31, 2025: Bellingcat Online Workshop (16-hour) [Americas / Europe-friendly time]
bellingcat.comยท15h
๐Ÿ›ก๏ธeBPF Security
Flag this post
After VMware: Managing end-of-life for Proxmox Hypervisors
runzero.comยท3h
๐Ÿ’ฟProxmox HA
Flag this post
Proton Exposes 300 Million Stolen Credentials โ€” 49% Include Passwords
forbes.comยท15h
๐Ÿ”“Password Cracking
Flag this post
Creating a "Two-Face" Rust binary on Linux
synacktiv.comยท3d
๐Ÿฆ Parasitic Storage
Flag this post
The researcherโ€™s desk: CVE-2025-20362
blog.detectify.comยท3h
๐Ÿ”“Hacking
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.ioยท3dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Flag this post
Holographic theory of LLMs: explains unbreakable bias and cross-model infection
habr.comยท2dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Flag this post
France jacks into the Matrix for state messaging โ€“ and pays too
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ‡ซ๐Ÿ‡ทFrench Computing
Flag this post
Talk about geriatric - This devious Android malware escapes detection by typing like an old person
techradar.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
CNCF [Cloud Native Computing Foundation]: Taming AI Sprawl: Your First Look at the Envoy AI Gateway
dev.toยท11hยท
Discuss: DEV
๐Ÿ Homelab Orchestration
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.comยท21h
๐ŸŽฏThreat Hunting
Flag this post
Covert Surveillance in Smart Devices: A SCOUR Framework Analysis of Youth Privacy Implications
arxiv.orgยท2d
๐Ÿ•ณ๏ธInformation Leakage
Flag this post
Model Inversion with Layer-Specific Modeling and Alignment for Data-Free Continual Learning
arxiv.orgยท11h
๐Ÿง Machine Learning
Flag this post
Dual-Mind World Models: A General Framework for Learning in Dynamic Wireless Networks
arxiv.orgยท2d
๐Ÿง Machine Learning
Flag this post
Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russia
securityaffairs.comยท1d
๐Ÿ›กCybersecurity
Flag this post
Building Intelligent AI Agents with Modular Reinforcement Learning
dev.toยท14hยท
Discuss: DEV
โšกIncremental Computation
Flag this post
SoraNav: Adaptive UAV Task-Centric Navigation via Zeroshot VLM Reasoning
arxiv.orgยท1d
๐ŸŒ€Riemannian Computing
Flag this post
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
rapid7.comยท3d
๐ŸŽฏThreat Hunting
Flag this post
Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
unit42.paloaltonetworks.comยท2d
๐Ÿฆ Malware Analysis
Flag this post