The Most Critical Linux Kernel Breaches of 2025 So Far
linuxjournal.comยท2d
๐Browser Exploitation
Flag this post
Playing Around with ARM Assembly
๐ฆRust
Flag this post
Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs
securityaffairs.comยท23h
๐Browser Exploitation
Flag this post
Looking for help with GTS random crashing
๐ฆRust
Flag this post
Invisible malware spread via VS Code extensions
techzine.euยท17h
๐Browser Exploitation
Flag this post
Show HN: Elden Stack โ A mini game where your stack overflows in glorious combat
๐ฆRust
Flag this post
Metaโs โRule of Twoโ Is Dangerous: The AI Security Crisis No Oneโs Admitting
pub.towardsai.netยท4h
๐Security
Flag this post
Top Control of Q4 2025: Penetration Testing
lmgsecurity.comยท17h
๐Security
Flag this post
Reversing at Scale: AI-Powered Malware Detection for Appleโs Binaries
๐Reverse Engineering
Flag this post
ELA-1568-1 unbound1.9 security update
freexian.comยท13h
๐ฆRust
Flag this post
Moves Are Broken
๐Fuzzing
Flag this post
BONK Slides 4% as Support Break Sparks Renewed Technical Weakness
coindesk.comยท16h
๐Browser Exploitation
Flag this post
An open-source conflict has emerged between Google and FFmpeg regarding AI-identified software vulnerabilities
๐Browser Exploitation
Flag this post
iroh 0.95.0 - A New Relay, Error Handling, and Connection API Improvements
iroh.computerยท2d
๐Browser Exploitation
Flag this post
Cisco: Partially critical security vulnerabilities in multiple products
heise.deยท23h
๐Browser Exploitation
Flag this post
OpenBSD CWM configuration breakdown
discoverbsd.comยท1d
๐ฆRust
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.comยท6h
๐Browser Exploitation
Flag this post
Once upon a time this blog was powered by make
๐ฆRust
Flag this post
Loading...Loading more...