The Role of Asset Management in Vulnerability Management
optiv.com·5h
🌳Git
Flag this post
Bridging the gaps between protocol specifications and practice
blog.apnic.net·3h
⛓️Blockchain
Flag this post
2025 Holiday Readiness Checklist (Page Speed Edition!)
speedcurve.com·2h
🔐Cryptography
Flag this post
Enterprise Design Patterns: The Repository Pattern (Catalog of Patterns of EAA) — A Practical Guide with Python
dev.to·1h·
Discuss: DEV
🌳Git
Flag this post
Your Network, Your Rules: Why DDoS Protection Finally Works on Your Terms
corero.com·13h
🐧Linux
Flag this post
New comment by iamartech in "Ask HN: Who wants to be hired? (November 2025)"
docs.google.com·6h·
Discuss: Hacker News
🐧Linux
Flag this post
The next great cybersecurity threat: Agentic AI
nordot.app·7h
⛓️Blockchain
Flag this post
Ray Security – Predictive Data Security Platform
raysecurity.io·12h·
Discuss: Hacker News
🐧Linux
Flag this post
International Threats – Infection URLs Used in Regional Phishing Campaigns
cofense.com·1d
🔐Cryptography
Flag this post
Show HN: When 7 Codex Agents Sent Each Other 1k Messages over 2 Days
dicklesworthstone.github.io·5h·
Discuss: Hacker News
🌳Git
Flag this post
Fantasy Hub: Another Russian Based RAT as M-a-a-S
zimperium.com·13h
💻CLI Tools
Flag this post
User Acceptance Testing: Steps Every PM Should Know
techrepublic.com·13h
🌳Git
Flag this post
SonicWall says state-sponsored hackers behind September security breach
bleepingcomputer.com·1d·
Discuss: r/technews
🐧Linux
Flag this post
How I Cracked the eJPT Exam in Just 3 Hours with a Score of 85%
infosecwriteups.com·3d
💎Ethereum
Flag this post
A Deep Dive into the Morris Worm
rapid7.com·21h·
Discuss: Hacker News
🐧Linux
Flag this post
Telecom industry embraces “collective defence” model to counter rising cyber threats
dev.to·8h·
Discuss: DEV
⛓️Blockchain
Flag this post
SANS Institute drives regional cyber upskilling with SANS Gulf Region 2025
zawya.com·2d
🔐Cryptography
Flag this post
2025 Cybersecurity Predictions: How did we do?
rapid7.com·1d
🔐Cryptography
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·1d
🐧Linux
Flag this post