Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.com·1d
🌡️Preservation Entropy
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.com·19h
🔍NTLM Forensics
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·13h
🎫Kerberos Attacks
Error'd: Yes We Have No Bananas
thedailywtf.com·1d
🔓Hacking
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.com·16h
🏺Kerberos Archaeology
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.io·14h·
Discuss: Hacker News
🛡️Error Boundaries
E-Evidence: Government wants to facilitate international access to cloud data
heise.de·2d
⚖️Legal Compliance
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·19h·
Discuss: Hacker News
🎫Kerberos Exploitation
Show HN: 1M retail interior image dataset for computer vision (UK/US/EU)
groceryinsight.com·22h·
Discuss: Hacker News
🏺Compression Museums
Pacsea: Arch Package Manager TUI
github.com·1d·
Discuss: r/linux
❄️Nixpkgs
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·2d·
Discuss: Hacker News
🔓Reverse engineering
A new breed of analyzers
daniel.haxx.se·22h·
🐛Fuzzing
Using Pydantic for ETL - Clean, Validate, and Transform Data with Confidence
dev.to·1d·
Discuss: DEV
Format Validation
Show HN: Rebuilt Bible search app to run 100% client-side with Transformers.js
biblos.app·12h·
Discuss: Hacker News
📜Binary Philology
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·16h·
Discuss: Hacker News
🚀Indie Hacking
To MD - Convert PDFs, Word, HTML and more to Markdown
tomd.io·1d·
Discuss: Hacker News
🔄Migration Tools
The People Rescuing Forgotten Knowledge Trapped On Old Floppy Disks
it.slashdot.org·12h
💽Floppy disks
Introducing OpenZL: An Open Source Format-Aware Compression Framework
engineering.fb.com·4d·
Modern Compression
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
Cache smuggling: When a picture isn't a thousand words
expel.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities