The Law of Leaky Abstractions
🦀Rust
Flag this post
Security.txt across the industry (denog17)
cdn.media.ccc.de·22h
🦀Rust
Flag this post
Google’s Latest Security Push Marks the Slow Death of Passwords
techrepublic.com·2h
🐧Linux
Flag this post
Ossa: Towards the Next Generation Web
🦀Rust
Flag this post
Chinese Hackers Attack Prominent U.S Organizations
blogger.com·2d
🦀Rust
Flag this post
Australia implements world's strictest social media ban for under-16s
ppc.land·1d
🦀Rust
Flag this post
Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack
techdirt.com·4d
🦀Rust
Flag this post
Think Quantum Computing is Hype? Mastercard Begs to Disagree
semiwiki.com·23h
🦀Rust
Flag this post
Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware
thehackernews.com·1d
🦀Rust
Flag this post
Battle Compliance Confusion and Security Fatigue with Qualys and ServiceNow
blog.qualys.com·15h
🐧Linux
Flag this post
CytoSorbents to Participate at the Jefferies Global Healthcare Conference in London
prnewswire.com·1h
🦀Rust
Flag this post
Cyber insurers paid out over twice as much for UK ransomware attacks last year
theregister.com·2h
🦀Rust
Flag this post
The Builder's Notes: Your CFO Just Called — Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.net·1d
🦀Rust
Flag this post
Securing critical infrastructure: Why Europe’s risk-based regulations matter
microsoft.com·5d
🦀Rust
Flag this post
Loading...Loading more...