Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·2d
🦠Parasitic Storage
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·1d
🛡️eBPF Security
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·4h
🕵️Vector Smuggling
Flag this post
Show HN: Ellipticc Drive – open-source cloud drive with E2E and PQ encryption
🔐Archive Encryption
Flag this post
The internet was made for privacy
doctorow.medium.com·1d
🧲Magnetic Philosophy
Flag this post
Klara at the OpenZFS User & Developer Summit 2025
klarasystems.com·1d
💿ZFS Archaeology
Flag this post
HighPoint RocketAIC 7608AW Review: The Fast Gets Even Faster with 56 GB/s of throughput
tomshardware.com·1d
🖥️Modern Terminals
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
🔗Hash Chains
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·1d
🌳Archive Merkle Trees
Flag this post
JavaScript Utility Library Lodash Changing Governance Model
thenewstack.io·5h
🔄Language Evolution
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️eBPF Security
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.com·1d
📄Document Digitization
Flag this post
Scientists Think This Tasty Snack Could Revolutionize Computing
popularmechanics.com·1d
⚡Homebrew CPUs
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·3d
🦠Malware Analysis
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·23h
🔓Hacking
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·1d
🔐Hash Functions
Flag this post
NEWS ROUNDUP – 31st October 2025
digitalforensicsmagazine.com·1d
🛡Cybersecurity
Flag this post
Loading...Loading more...