Linux Kernel, Performance Tracing, Security Monitoring, Observability

WASM in the Kernel: Tales of Triumph and Trouble
riptides.io·7h·
Discuss: Hacker News
🔒WASM Capabilities
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.com·1d
🛡️eBPF Security
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·9h
🔐Cryptographic Archaeology
rblhost: Exploring Rust’s Role in Embedded Development Tools
mcuoneclipse.com·1d
🦀Embedded Rust
My First Contribution to Linux
vkoskiv.com·9h·
📺VT100 Emulation
Understanding Linux Namespaces: A Guide to Process Isolation
dev.to·4h·
Discuss: DEV
🔩Systems Programming
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·13h
🎫Kerberos Exploitation
Security Model: Wayland vs. Xorg in Linux
openlib.io·59m·
Discuss: Hacker News
🛡️RISC-V Security
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·5h
🎫Kerberos Attacks
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·4h
🛡️eBPF Security
LibreQoS v1.5-RC-2
libreqos.io·1h
🔌Interface Evolution
Multiply kernels on one system.
reddit.com·1d·
Discuss: r/linux
🔩Systems Programming
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·8h
📦Container Security
6th October – Threat Intelligence Report
research.checkpoint.com·11h
🛡Cybersecurity
Is Odin Just a More Boring C?
dayvster.com·10h·
Discuss: Hacker News
🔩Systems Programming
CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
tenable.com·19h
🔓Hacking
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·17h
🔧Hardware Verification
This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model
hackaday.com·3d
🛡️RISC-V Security
When your “home server” draws more power than your neighbor’s sauna
i.redd.it·1d·
Discuss: r/homelab
🏠HomeLab