How I Cracked the eJPT Exam in Just 3 Hours with a Score of 85%
infosecwriteups.comยท1h
๐ŸšชEscape Routes
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.netยท11hยท
Discuss: Hacker News
๐ŸšชEscape Routes
Flag this post
Visual Backdoor Attacks on MLLM Embodied Decision Making via Contrastive Trigger Learning
arxiv.orgยท5h
๐ŸƒCamouflage
Flag this post
New Rotary Latch Brings Master Key Convenience To Heavy Machinery
zawya.comยท8h
๐Ÿ‘๏ธSurveillance Detection
Flag this post
RP2350 hacking challenge 2: into extra time
raspberrypi.comยท41m
๐Ÿ•ตOSINT
Flag this post
Tutorials in Optomechanics
wp.optics.arizona.eduยท5hยท
Discuss: Hacker News
๐Ÿ‘๏ธSurveillance Detection
Flag this post
Scientists achieve forensicsโ€™ โ€œHoly Grailโ€ by recovering fingerprints from fired bullets
sciencedaily.comยท9h
๐Ÿ•ตOSINT
Flag this post
Security habits around the world: A closer look at password statistics | Bitwarden
bitwarden.comยท17h
๐ŸšชEscape Routes
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.comยท2h
๐Ÿ•ตOSINT
Flag this post
Hackers and Crime Rings Are Teaming Up to Steal Cargo, Cyber Firm Says
bloomberg.comยท1h
โš”๏ธGray Zone Warfare
Flag this post
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats
dev.toยท1hยท
Discuss: DEV
๐ŸšชEscape Routes
Flag this post
Celtic Code: Drawing Knots with Python
2earth.github.ioยท2hยท
Discuss: Hacker News
๐ŸชขKnot Tying
Flag this post
This 6.5g Quick-Release Titanium Keychain Opens With One Hand
yankodesign.comยท7h
๐ŸชขKnot Tying
Flag this post
Trying to understand my own cognitive edge
lesswrong.comยท1h
๐ŸƒCamouflage
Flag this post
Tre โ€” PG Play Writeup
infosecwriteups.comยท1h
๐Ÿ•ตOSINT
Flag this post
How to Reset SOLIDWORKS PDM Admin Password: Quick Guide
cad-store.netยท14hยท
Discuss: DEV
๐Ÿ•ตOSINT
Flag this post
What Artifacts Teach Us
systemsapproach.orgยท3h
๐Ÿ”ฅPrimitive Technology
Flag this post
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
theregister.comยท11h
๐Ÿ‘๏ธSurveillance Detection
Flag this post
Reflections on Trusting Trust (1984)
web.archive.orgยท18hยท
Discuss: Hacker News
๐Ÿ•ตOSINT
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonw.substack.comยท9hยท
Discuss: Substack
๐Ÿ‘๏ธSurveillance Detection
Flag this post