The Law of Leaky Abstractions
🦀Rust
Flag this post
Security.txt across the industry (denog17)
cdn.media.ccc.de·20h
🦀Rust
Flag this post
I logged all the HTTP requests that hit my new web server
lenny.bearblog.dev·2d
🐧Linux
Flag this post
How to store passwords in your database
🦀Rust
Flag this post
America's Historic 40-Day Shutdown and Its Ripple Effects on Singapore - Maxthon
blog.maxthon.com·1d
🦀Rust
Flag this post
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper
pberba.github.io·11h
🐧Linux
Flag this post
Chinese Hackers Attack Prominent U.S Organizations
blogger.com·2d
🦀Rust
Flag this post
Ossa: Towards the Next Generation Web
🦀Rust
Flag this post
Best infosec-related long reads for the week of 11/1/25
metacurity.com·2d
🐧Linux
Flag this post
Australia implements world's strictest social media ban for under-16s
ppc.land·1d
🦀Rust
Flag this post
Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack
techdirt.com·3d
🦀Rust
Flag this post
Battle Compliance Confusion and Security Fatigue with Qualys and ServiceNow
blog.qualys.com·12h
🐧Linux
Flag this post
Think Quantum Computing is Hype? Mastercard Begs to Disagree
semiwiki.com·21h
🦀Rust
Flag this post
Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware
thehackernews.com·1d
🦀Rust
Flag this post
The Builder's Notes: Your CFO Just Called — Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.net·1d
🦀Rust
Flag this post
Loading...Loading more...