Feeds to Scour
SubscribedAll
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Security
Preview
Report Post
What Actually Determines a File's Type
dev.toยท7hยท
Discuss: DEV
๐Ÿ’พDigital Archiving
Preview
Report Post
Rich Headers: leveraging this mysterious artifact of the PE format
virusbulletin.comยท3hยท
Discuss: Hacker News
๐Ÿ”งMise
Preview
Report Post
Malware found in the subtitles of a fake Leonardo DiCaprio movie torrent
bitdefender.comยท1dยท
Discuss: Hacker News
๐ŸšShell Scripting
Preview
Report Post
How to Secure MCP Server?
dev.toยท2dยท
Discuss: DEV
๐Ÿ”’Security
Preview
Report Post
Post-Quantum Cryptography on CHERIoT
cheriot.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Preview
Report Post
RFC 6677 DNS Transport over TCP โ€“ Implementation Requirements
ietf.orgยท1dยท
Discuss: Hacker News
๐Ÿ”’Caddy
Preview
Report Post
Networking for Cybersecurity (Part 4): Packets, Sniffing & Traffic Analysis
dev.toยท2dยท
Discuss: DEV
๐ŸŒNetwork Security
Preview
Report Post
I wanted to know how malware works, so I built an analyser
dev.toยท3dยท
Discuss: DEV
๐Ÿ”ŽStatic Analysis
Preview
Report Post
Going Through Snowden Documents, Part 1
libroot.orgยท1dยท
Discuss: Hacker News
๐ŸŽญPrivacy Engineering
Preview
Report Post
Show HN: Sss โ€“ S3 Client
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Caddy
Preview
Report Post
Fwknop: Single Packet Authorization > Port Knocking
cipherdyne.orgยท1dยท
Discuss: Hacker News
๐Ÿ”’Caddy
Preview
Report Post
๐Ÿ•ต๏ธโ€โ™€๏ธ Nmap & Scapy on Kali: A Beginner-Friendly Packet Adventure
linkedin.comยท2dยท
Discuss: DEV
๐ŸงLinux
Preview
Report Post
Show HN: I built a mitmproxy AI agent using 4000 paid security disclosures
instavm.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Code Review Automation
Preview
Report Post
SeguraPass: A Zero-Knowledge, End-to-End Encrypted Password Manager Built in Java
github.comยท2dยท
Discuss: DEV
๐Ÿ”’Security
Preview
Report Post
Building a Zero-Knowledge File Sharing Platform with Client-Side Encryption
filebee.inยท3dยท
Discuss: DEV
๐Ÿฆ•Deno
Preview
Report Post
Navigating the Data Compliance Landscape: A Strategic Guide for Modern Organizations
dev.toยท2dยท
Discuss: DEV
๐Ÿ”’Security
Preview
Report Post
10 Years of Let's Encrypt
letsencrypt.orgยท3dยท
Discuss: Hacker News
๐Ÿ”’Digital Privacy
Preview
Report Post
Stallman โ€“ Lisp
stallman.orgยท3dยท
Discuss: Hacker News
๐ŸงLinux
Preview
Report Post
AWS re:Invent 2025 - From threat to threat intel: 360 degrees of DDOS (NET318)
dev.toยท2dยท
Discuss: DEV
๐ŸŒNetwork Security
Preview
Report Post