The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.com·10h
Proof Automation
Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.to·6h·
Discuss: DEV
🧪Binary Fuzzing
Semantic Dictionary Encoding
falvotech.com·18h·
Discuss: Hacker News
🌀Brotli Dictionary
The many, many, many JavaScript runtimes of the last decade
shapeof.com·14h
🏗️Compiler Archaeology
Analyzing Lisp Redux: One Form At a Time
funcall.blogspot.com·17h·
🔗Lisp
NPM Supply Chain Malware with Self-Replicating Behaviour
safedep.io·1h·
Discuss: Hacker News
📦Package Managers
Google Summer of Code 2025 Reports: Enhancing Support for NAT64 Protocol Translation in NetBSD
blog.netbsd.org·16h
📝ABNF Parsing
VulAgent: Hypothesis-Validation based Multi-Agent Vulnerability Detection
arxiv.org·4h
Proof Automation
utf-8-history.txt
cl.cam.ac.uk·2h
🔤Character Encoding
Show HN: KittyLoader – a modern shellcode loader displaying top-tier evasion
github.com·2d·
Discuss: Hacker News
🦠Malware Analysis
Is IP fragmentation still considered vulnerable?
blog.apnic.net·7h
🌐DNS Security
Attackers can paralyze IT security solution IBM QRadar SIEM
heise.de·14h
🔐Systems Hardening
A Word about Complexity
dillo-browser.github.io·1d·
Discuss: Hacker News
🔓Open Source Software
15 Best Practices for Building MCP Servers in Production
thenewstack.io·16h
🌐NetworkProtocols
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.com·4d·
Discuss: Hacker News
🛡️WASM Sandboxing
IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.org·21h·
Discuss: Hacker News
🌳Archive Merkle Trees
Balance between refactoring and inheritance in your code
github.com·20h·
Discuss: Hacker News
Format Verification
Open Security News week 37-2025
nocomplexity.com·1d
🔓Hacking
Otto Kekäläinen: Zero-configuration TLS and password management best practices in MariaDB 11.8
optimizedbyotto.com·2d·
Discuss: Hacker News
🎯NTLM Attacks