Open Source Intelligence, Threat Hunting, Digital Forensics, Social Engineering

Osint Intelligence Analysis
opensourceintelligence.biz·1d·
Discuss: Hacker News
📊Threat Intelligence
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·1d
⚛️Quantum Security
Flag this post
Speedrunning an RL Environment
sidb.in·8h·
Discuss: Hacker News
🤖AI
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·4h
🛡️AI Security
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.com·1d·
Discuss: Hacker News
📊Threat Intelligence
Flag this post
MCP Security: Navigating the Exploit Playbook for Agent
dev.to·18h·
Discuss: DEV
🛡️AI Security
Flag this post
Cloud CISO Perspectives: AI as a strategic imperative to manage risk
cloud.google.com·1d
🛡️AI Security
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.com·12h·
Discuss: Hacker News
📊Threat Intelligence
Flag this post
OpenAI unveils Aardvark, a GPT-5-powered agent for cybersecurity research
zdnet.com·2d·
Discuss: Hacker News
🖥️Self-hosted apps
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·3d·
Discuss: Hacker News
🛠️Product Security
Flag this post
Context Engineering: The Foundation for Reliable AI Agents
thenewstack.io·23h
👨‍💻AI Coding
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.org·2d·
Discuss: Hacker News
🔐Privacy Tech
Flag this post
Age Verification, Estimation, Assurance, Oh My! A Guide to the Terminology
eff.org·1d
🔐Privacy Tech
Flag this post
OpenAI Launches Aardvark To Detect and Patch Hidden Bugs In Code
it.slashdot.org·17h
🛠️Product Security
Flag this post
Free Alternatives to Cheaterbuster AI: Build Your Own AI Investigator
dev.to·5h·
Discuss: DEV
🚫Zero Trust
Flag this post
Oops, My UUIDs Collided
alexsci.com·1d·
Discuss: Hacker News
⚛️Quantum Security
Flag this post
AI Red Teaming Guide
github.com·2d·
Discuss: Hacker News
🛡️AI Security
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·1d·
Discuss: Hacker News
🛡Cybersecurity
Flag this post
The Secret World of Russia's Cold War Mapmakers (2015)
wired.com·11h·
Discuss: Hacker News
🏗information architecture
Flag this post
Neither Consent nor Property: A Policy Lab for Data Law
arxiv.org·1d
🔒Privacy Engineering
Flag this post