Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.com·1d·
Discuss: Hacker News
👁️Surveillance Detection
Flag this post
Securely storing passwords in a database
dev.to·6h·
Discuss: DEV
🚪Escape Routes
Flag this post
Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.com·16h·
Discuss: Hacker News
🕵OSINT
Flag this post
A Sensory Journey through Scent
carlyaler470509.digiblogbox.com·9h
🐾Tracking Skills
Flag this post
Feeling Unsafe? Top Ten Practical, Legal Steps Thunder Bay Residents Can Take Right Now
netnewsledger.com·1d
🚪Escape Routes
Flag this post
application to automatically decrypt Obsidian vaults
reddit.com·2h·
Discuss: r/ObsidianMD
🕵OSINT
Flag this post
5 security myths that could be putting your Windows PC at risk
makeuseof.com·22h
👁️Surveillance Detection
Flag this post
Employees Are the New Hackers: 1Password Warns AI Use Is Breaking Corporate Security
it.slashdot.org·18h
🕵OSINT
Flag this post
Speedrunning an RL Environment
sidb.in·1d·
Discuss: Hacker News
💻CLI Tools
Flag this post
Rotterdam doctor sentenced for sexual misconduct with students and patient
nltimes.nl·8h
⛑️Battlefield Medicine
Flag this post
Growing VPN Exploits Trigger Fresh Ransomware Crisis in APAC
blogger.com·2h
⚔️Gray Zone Warfare
Flag this post
Mitre ATT&CK v18 released
medium.com·11h·
Discuss: Hacker News
👁️Surveillance Detection
Flag this post
Hackers target online stores with new attack
foxnews.com·1h
👁️Surveillance Detection
Flag this post
Voice-Controlled Security Door Lock using ESP32 + Face
hackster.io·3d
👁️Surveillance Detection
Flag this post
Best Digital Marketing Institute in Allahabad – Ndmit Prayagraj
ndmit.com·9h·
Discuss: Hacker News
🔍Intelligence Analysis
Flag this post
Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details
discuss.privacyguides.net·19h
🕵OSINT
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·2d
🚪Escape Routes
Flag this post
25 Que
lesswrong.com·3h
🛸Paranormal
Flag this post
How to Be Handier
nytimes.com·2d
🔥Primitive Technology
Flag this post
The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against LlmJailbreaks and Prompt Injections
dev.to·10h·
Discuss: DEV
🚪Escape Routes
Flag this post