The Network in QubesOS โ€“ Architecture, Routing, and Real-World Tests
richard-sebos.github.ioยท1dยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
Punching Holes into Firewalls
sebsauvage.netยท1dยท
Discuss: Hacker News
๐Ÿ”“DRM Analysis
Flag this post
From Beginner to Cyber-Aware: Lessons from My First Cybersecurity Course
netacad.comยท1dยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
BYOD security solutions explained
proton.meยท17hยท
Discuss: Hacker News
๐Ÿ”’Security
Flag this post
The Secret Society of the Link Layer
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“DRM Analysis
Flag this post
Non Human Identity Management: Securing the New Frontier of Automation
token.securityยท1dยท
Discuss: DEV
๐Ÿ†”Decentralized Identity (DID)
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.comยท19hยท
Discuss: Hacker News
๐Ÿ”’Security
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท9hยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Security
Flag this post
Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting
zeroday.forem.comยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธAI Security
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.comยท1dยท
Discuss: Hacker News
๐Ÿ”“DRM Analysis
Flag this post
Penetration Testing vs. Red Teaming
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธCybersecurity
Flag this post
Firewalls and VPNs are so complex now, they can actually make you less secure
theregister.comยท3dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท11hยท
Discuss: Hacker News
๐Ÿ’กObservability on a Budget
Flag this post
Whatever you do, donโ€™t disable these 11 Windows services
makeuseof.comยท17hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Go and enhance your calm: demolishing an HTTP/2 interop problem
blog.cloudflare.comยท16hยท
Discuss: Hacker News
๐Ÿ”’Caddy
Flag this post
Guide: TLS and QUIC
moq.devยท15hยท
Discuss: Hacker News
๐Ÿ”’Caddy
Flag this post
Beginners Guide to Building a Hardware Hacking Lab
voidstarsec.comยท16hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Securing and Authenticating MCP Connections: A Developer's Guide (That Won't Put You to Sleep)
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comยท19hยท
Discuss: Hacker News
๐Ÿ†”Decentralized Identity (DID)
Flag this post