Zero Standing Privileges vs Credential Vaulting
goteleport.comΒ·2d
🎯NTLM Attacks
Flag this post
Powerful Core Ultra 7 155U PC
blogger.comΒ·8h
πŸ”ŒOperating system internals
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.beΒ·2d
πŸ”Cryptographic Archaeology
Flag this post
Walking and Talking in the Woods with AI: The Future of Untethered Software Development
zackproser.comΒ·3d
πŸ“ŸCLI Design
Flag this post
Life Online Feels Fake Because of Drift: A Theory of Compression and Fidelity
therealitydrift.substack.comΒ·36mΒ·
Discuss: Substack
πŸ’ΏBinary Musicology
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.comΒ·2dΒ·
Discuss: Hacker News
πŸ”—Hash Chains
Flag this post
I Built Cloudflare Ingress Controller So I Could Access My Homelab from Outside
tunnel.strrl.devΒ·1dΒ·
Discuss: Hacker News
πŸ–₯️Self-hosted Infrastructure
Flag this post
You're all staff engineers now
jdauriemma.comΒ·21hΒ·
Discuss: Hacker News
πŸ”©Systems Programming
Flag this post
My Rough and Incomplete Back End Developer Skill Tree
iainschmitt.comΒ·2dΒ·
Discuss: Hacker News
πŸ”©Systems Programming
Flag this post
Kryypto, a keyboard-driven python text editor.
dev.toΒ·2dΒ·
Discuss: DEV
πŸͺŸAwesome windows command-line
Flag this post
BSI: Checklist for action in case of compromised accounts
heise.deΒ·2d
πŸ”“Hacking
Flag this post
I Built Quality Control Into an AI Tool's Architectureβ€”Here's What It Generated
dev.toΒ·3dΒ·
Discuss: DEV
πŸ§ͺProtocol Fuzzing
Flag this post
β€œThe $10,000 Handlebars Hack: How Email Templates Led to Server Takeover”
infosecwriteups.comΒ·5h
πŸ”“Hacking
Flag this post
Localized Kernel Projection Outlyingness: A Two-Stage Approach for Multi-Modal Outlier Detection
arxiv.orgΒ·1d
🧠Machine Learning
Flag this post
ReForm: Reflective Autoformalization with Prospective Bounded Sequence Optimization
arxiv.orgΒ·1d
πŸ’»Programming languages
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.orgΒ·10h
πŸ—ΊοΈCompetency Maps
Flag this post
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
rapid7.comΒ·2d
🎯Threat Hunting
Flag this post
Memento Spyware Tied to Chrome Zero-Day Attacks
darkreading.comΒ·2d
πŸ”“Hacking
Flag this post
Scratching the Itch, Paying the Debt: How Community Keeps Legacy Open Source Projects Alive
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”“Open Source Software
Flag this post