Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comΒ·1d
🎫Kerberos Exploitation
The Air Gap Is an Illusion: Securing AI Data Centers from Wireless Threats
bastille.netΒ·3d
🎫Kerberos History
Patch vs. Workaround: How CVEs Actually Get Fixed
bitsight.comΒ·1d
πŸ”“Hacking
tinyproxy/tinyproxy
github.comΒ·14h
❄️Nixpkgs
NASA Rover Finds β€˜Potential Biosignature’ on Mars
404media.coΒ·3h
🧊Arctic Storage
Reduce bandwidth costs with dm-cache: fast local SSD caching for network storage
devcenter.upsun.comΒ·4dΒ·
Discuss: Hacker News
⚑Redis Internals
I've been reading Ghostty's agent-generated bug fixes
ampcode.comΒ·20hΒ·
Discuss: Hacker News
⟷Bidirectional Programming
Terminating elegantly: a guide to graceful shutdowns
packagemain.techΒ·2dΒ·
Discuss: Hacker News
🌊Stream Processing
Building a gRPC Proxyless World: How Reddit Scaled Resilience... Shadi Altarsha & Sotiris Nanopoulos
youtube.comΒ·15h
⚑gRPC
Trusting builds with Bazel remote execution
blogsystem5.substack.comΒ·1dΒ·
Discuss: Substack
πŸ›‘οΈWebAssembly Security
Day 28: The 10x Performance Breakthrough
dev.toΒ·22hΒ·
Discuss: DEV
πŸ‘οΈSystem Observability
Automated Genotyping Error Correction via Bayesian Network Refinement in Applied Biosystems Gene Analyzers
dev.toΒ·1dΒ·
Discuss: DEV
🧬Copy Number Variants
Secure QKD Network Resilience via Dynamic Threshold-Adaptive Key Reconciliation
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”Quantum Cryptography
Automated Anomaly Detection in Hematology Analyzers via Multi-Modal Deep Learning
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”Vector Forensics
Preventing the NPM Debug/Chalk Compromise in 200 lines of JavaScript
getvouchsafe.orgΒ·2dΒ·
πŸ“¦Package Managers
β€œDay 25: The Cloud Heist β€” How a Forgotten Webhook Tester Gave Me the Keys to AWS”
infosecwriteups.comΒ·8h
πŸš€Indie Hacking
OpenSSF Experts Weigh in on CISA’s SBOM Minimum Elements Update
thenewstack.ioΒ·1d
❄️Nix Adoption
HybridPetya: More proof that Secure Boot bypasses are not just an urban legend
theregister.comΒ·17hΒ·
Discuss: Hacker News
πŸ”’Secure Boot
Kioptrix Level 2
infosecwriteups.comΒ·8h
πŸ“ŸTerminal Forensics