HYPE UP THE PSYOP! HYPE UP THE PSYOP! HYPE UP THE PSYOP! DANCE! DANCE!
threadreaderapp.comยท4h
๐Ÿ IndieWeb
Flag this post
Why a Unified Email Security Platform is Your Best Defense
blogs.cisco.comยท9h
๐Ÿ”„Sync Engine
Flag this post
Rethinking My AWS Admin Access: Lessons Learned From Moving to Single-Sign-On
dev.toยท2hยท
Discuss: DEV
๐Ÿ”„Sync Engine
Flag this post
Dennis Ritchie's story of dabbling in the cryptographic world
web.archive.orgยท10hยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post
New AI security tool lays out key exposures
reversinglabs.comยท6h
๐Ÿค–AI
Flag this post
I effed up so bad what on earth do I do (opened a harmful exe)
reddit.comยท1dยท
Discuss: r/Piracy
๐Ÿฆ€Rust
Flag this post
A security model for systemd
lwn.netยท1dยท
Discuss: Hacker News
โšกSystems Programming
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.comยท1dยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post
Comparison on Six Self-Hosted WAF
ly.safepoint.cloudยท20hยท
Discuss: DEV
๐ŸŒWebAssembly
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท3dยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post
Implementing JWT Authentication in Rust using Axum
dev.toยท2dยท
Discuss: DEV
๐Ÿฆ€Rust
Flag this post
Hackers love when you reuse passwordsโ€”hereโ€™s why itโ€™s so dangerous
howtogeek.comยท3d
๐Ÿ”Cryptography
Flag this post
The Best Smart Water-Leak Detector
nytimes.comยท4h
๐Ÿ”งEmbedded Systems
Flag this post
Vibecoding and the future of code security
dev.toยท4hยท
Discuss: DEV
๐ŸŒWebAssembly
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.ioยท13hยท
Discuss: Hacker News
๐ŸŒWebAssembly
Flag this post
Creating a dummy login for HP laptop
reddit.comยท1dยท
Discuss: r/Windows11
๐Ÿ”„Sync Engine
Flag this post
NEW: Get a lifetime subscription to 1ForAll AI for only $29.99
neowin.netยท1d
๐Ÿ IndieWeb
Flag this post
An ARENA 6.0 Capstone: Model Organism of Encoded Reasoning
lesswrong.comยท23h
๐ŸŒWebAssembly
Flag this post
Cloud CISO Perspectives: Recent advances in how threat actors use AI tools
cloud.google.comยท1d
๐Ÿค–AI
Flag this post
Stop foreign-owned apps from harvesting your personal data
foxnews.comยท1d
๐Ÿ”Cryptography
Flag this post