The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.com·12h
Proof Automation
Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.to·9h·
Discuss: DEV
🧪Binary Fuzzing
RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT
securelist.com·44m
🎫Kerberos Exploitation
Semantic Dictionary Encoding
falvotech.com·20h·
Discuss: Hacker News
🌀Brotli Dictionary
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·1h
🛡️CLI Security
The many, many, many JavaScript runtimes of the last decade
shapeof.com·16h
🏗️Compiler Archaeology
Analyzing Lisp Redux: One Form At a Time
funcall.blogspot.com·19h·
🔗Lisp
NPM Supply Chain Malware with Self-Replicating Behaviour
safedep.io·3h·
Discuss: Hacker News
📦Package Managers
Google Summer of Code 2025 Reports: Enhancing Support for NAT64 Protocol Translation in NetBSD
blog.netbsd.org·18h
📝ABNF Parsing
VulAgent: Hypothesis-Validation based Multi-Agent Vulnerability Detection
arxiv.org·6h
Proof Automation
utf-8-history.txt
cl.cam.ac.uk·5h
🔤Character Encoding
Show HN: KittyLoader – a modern shellcode loader displaying top-tier evasion
github.com·2d·
Discuss: Hacker News
🦠Malware Analysis
Is IP fragmentation still considered vulnerable?
blog.apnic.net·9h
🌐DNS Security
Attackers can paralyze IT security solution IBM QRadar SIEM
heise.de·16h
🔐Systems Hardening
A Word about Complexity
dillo-browser.github.io·1d·
Discuss: Hacker News
🔓Open Source Software
15 Best Practices for Building MCP Servers in Production
thenewstack.io·18h
🌐NetworkProtocols
Show HN: OSS SDK for Digital Identity
ssi-sdk.blockialabs.com·56m·
Discuss: Hacker News
🔤EBCDIC Privacy
You Want Technology With Warts
entropicthoughts.com·12h
🏠Homelab Archaeology
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.com·4d·
Discuss: Hacker News
🛡️WASM Sandboxing