Balance between refactoring and inheritance in your code
github.com·23h·
Discuss: Hacker News
Format Verification
Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.to·9h·
Discuss: DEV
🧪Binary Fuzzing
The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.com·13h
Proof Automation
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·1h
🛡️CLI Security
When ‘minimal impact’ isn’t reassuring: lessons from the largest npm supply chain compromise
cyberscoop.com·22h
🎫Kerberos Attacks
Deploy a PHP web app with Docker & K8s, with NGINX, PHP, and a CI/CD pipeline powered by GitHub…
blog.devops.dev·20h
📦Container Security
Show HN: OSS SDK for Digital Identity
ssi-sdk.blockialabs.com·1h·
Discuss: Hacker News
🔤EBCDIC Privacy
NPM Supply Chain Malware with Self-Replicating Behaviour
safedep.io·4h·
Discuss: Hacker News
📦Package Managers
PrivWeb: Unobtrusive and Content-aware Privacy Protection For Web Agents
arxiv.org·7h
🛡️WASM Sandboxing
The many, many, many JavaScript runtimes of the last decade
shapeof.com·17h
🏗️Compiler Archaeology
Cap'n Proto - structured data serialziation format
capnproto.org·17h
📋Protocol Buffers
Shiny tools, shallow checks: how the AI hype opens the door to malicious MCP servers
securelist.com·1d
🔓Hacking
Building Resilient IT Infrastructure From the Start
darkreading.com·21h
🔐Capability Systems
Securing and Scaling AI-Powered APIs
capestart.com·22h·
Discuss: Hacker News
🌊Streaming Systems
Top 38 .NET interview questions asked in 2025
dotnetinterviews.com·21h·
Discuss: Hacker News
🔤DSLs
Malicious code loophole in Microsoft Agentic AI and Visual Studio closed
heise.de·17h
🔓Hacking
How to implement the Outbox pattern in Go and Postgres
packagemain.tech·3h·
📋Protocol Buffers
A Word about Complexity
dillo-browser.github.io·1d·
Discuss: Hacker News
🔓Open Source Software
Open Security News week 37-2025
nocomplexity.com·1d
🔓Hacking