We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·2d·
Discuss: Hacker News
🦙Ollama
Flag this post
The Strategic Role of MSPs in Cybersecurity: What Developers and Tech Leads Should Know in 2025
dev.to·7h·
Discuss: DEV
AI-Driven DevOps
Flag this post
Composer Patches 2.0.0
cweagans.net·6h·
Discuss: Hacker News
🎼Composer
Flag this post
Exhaustive Guide to Generative and Predictive AI in AppSec
qwiet.ai·13h·
Discuss: DEV
🔎Static Analysis
Flag this post
Malicious packages in NPM evade dependency detection through invisible URL links
csoonline.com·3h·
Discuss: Hacker News
📦Dependency Confusion
Flag this post
How Telecoms Monetize Security Bundles by Adding Password Managers
purevpn.com·10h·
Discuss: DEV
🔐Hardware Security
Flag this post
Best Open Source Observability Solutions
clickhouse.com·3h·
Discuss: Hacker News
💡Observability on a Budget
Flag this post
Debug like a boss: 10 debugging hacks for developers, quality engineers, testers
ministryoftesting.com·7h·
Discuss: Hacker News
🔍Git Bisect
Flag this post
AI Guardrails: Ensuring Safe, Ethical, and Reliable AI Deployment
patronus.ai·1d·
Discuss: DEV
AI Ethics & Alignment
Flag this post
Is Your Business Prepared? A Deep Dive into Cyber Risk Management
intelligencex.org·2d·
Discuss: DEV
🔒Security
Flag this post
Building a Conscious Cybersecurity System: How We Apply Integrated Information Theory to Threat Hunting
zeroday.forem.com·1d·
Discuss: DEV
🛡️AI Security
Flag this post
Beginners Guide to Building a Hardware Hacking Lab
voidstarsec.com·8h·
Discuss: Hacker News
🔐Hardware Security
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·2d·
Discuss: Hacker News
📦Dependency Confusion
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.com·11h·
Discuss: Hacker News
🔒Security
Flag this post
Evading AV and EDR solutions
dev.to·15h·
Discuss: DEV
🔓DRM Analysis
Flag this post
Breaking into GitLab: Attacking and Defending Self-Hosted CI/CD Environments
risk3sixty.com·1d·
Discuss: Hacker News
📋Infrastructure as Code (IaC)
Flag this post
Introducing Aardvark: OpenAI’s agentic security researcher
openai.com·1d·
🔎Static Analysis
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·1h·
Discuss: Hacker News
🛡️AI Security
Flag this post
Security news weekly round-up - 31st October 2025
dev.to·1h·
Discuss: DEV
🔐Hardware Security
Flag this post
Exhaustive Guide to Generative and Predictive AI in AppSec
sites.google.com·3d·
Discuss: DEV
🛡️AI Security
Flag this post