Zero Standing Privileges vs Credential Vaulting
goteleport.comΒ·2d
π―NTLM Attacks
Flag this post
Powerful Core Ultra 7 155U PC
blogger.comΒ·8h
πOperating system internals
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.beΒ·2d
πCryptographic Archaeology
Flag this post
Walking and Talking in the Woods with AI: The Future of Untethered Software Development
zackproser.comΒ·3d
πCLI Design
Flag this post
Life Online Feels Fake Because of Drift: A Theory of Compression and Fidelity
πΏBinary Musicology
Flag this post
I Built Cloudflare Ingress Controller So I Could Access My Homelab from Outside
π₯οΈSelf-hosted Infrastructure
Flag this post
You're all staff engineers now
π©Systems Programming
Flag this post
BSI: Checklist for action in case of compromised accounts
heise.deΒ·2d
πHacking
Flag this post
I Built Quality Control Into an AI Tool's ArchitectureβHere's What It Generated
π§ͺProtocol Fuzzing
Flag this post
βThe $10,000 Handlebars Hack: How Email Templates Led to Server Takeoverβ
infosecwriteups.comΒ·5h
πHacking
Flag this post
Localized Kernel Projection Outlyingness: A Two-Stage Approach for Multi-Modal Outlier Detection
arxiv.orgΒ·1d
π§ Machine Learning
Flag this post
ReForm: Reflective Autoformalization with Prospective Bounded Sequence Optimization
arxiv.orgΒ·1d
π»Programming languages
Flag this post
Tackling the Algorithmic Control Crisis -- the Technical, Legal, and Ethical Challenges of Research into Algorithmic Agents
arxiv.orgΒ·10h
πCultural Algorithms
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.orgΒ·10h
πΊοΈCompetency Maps
Flag this post
Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond
rapid7.comΒ·2d
π―Threat Hunting
Flag this post
Memento Spyware Tied to Chrome Zero-Day Attacks
darkreading.comΒ·2d
πHacking
Flag this post
Loading...Loading more...