A Deep Dive into the Morris Worm
rapid7.comยท22hยท
Discuss: Hacker News
๐ŸŒBrowser Exploitation
Flag this post
Fil-C
graydon2.dreamwidth.orgยท1dยท
๐Ÿฆ€Rust
Flag this post
We Tested 6 AI Models on 3 Advanced Security Exploits: The Results
dev.toยท16hยท
Discuss: DEV
๐ŸŒBrowser Exploitation
Flag this post
9 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads
socket.devยท9h
๐ŸŒBrowser Exploitation
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.comยท1d
๐ŸŒBrowser Exploitation
Flag this post
Low-Level Hacks
blog.raycursive.comยท3dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Void-Vault: A deterministic generative solution to password management
github.comยท8hยท
Discuss: r/archlinux
๐Ÿ”’Security
Flag this post
Vibing Negative
theblackwall.ukยท11h
๐Ÿฆ€Rust
Flag this post
Exceptions in Cranelift and Wasmtime
cfallin.orgยท10hยท
๐Ÿฆ€Rust
Flag this post
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
thehackernews.comยท16h
๐ŸŒBrowser Exploitation
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.ioยท1dยท
๐Ÿฆ€Rust
Flag this post
A Security Model for Systemd
lwn.netยท19hยท
๐Ÿ”’Security
Flag this post
AIxCC 2025: What It Means For Device Security
semiengineering.comยท20h
๐ŸŒBrowser Exploitation
Flag this post
About kgateway vulnerabilities
reddit.comยท9hยท
Discuss: r/kubernetes
๐ŸŒBrowser Exploitation
Flag this post
Combine Java and Rust Code Coverage in a Polyglot Project
questdb.comยท18hยท
Discuss: r/programming
๐Ÿฆ€Rust
Flag this post
ct.sh: the smallest CT/CD system
cceckman.comยท11h
๐Ÿฆ€Rust
Flag this post
ClusterMAX 2.0 is here!
threadreaderapp.comยท11h
๐ŸŒBrowser Exploitation
Flag this post
Announcing Magika 1.0: now faster, smarter, and rebuilt in Rust
blogger.comยท8h
๐Ÿฆ€Rust
Flag this post
The Most Critical Linux Kernel Breaches of 2025 So Far
linuxjournal.comยท2d
๐ŸŒBrowser Exploitation
Flag this post