Top Control of Q4 2025: Penetration Testing
lmgsecurity.comΒ·22h
πSecurity
Flag this post
Reversing at Scale: AI-Powered Malware Detection for Appleβs Binaries
πReverse Engineering
Flag this post
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
unit42.paloaltonetworks.comΒ·3h
πBrowser Exploitation
Flag this post
Looking for help with GTS random crashing
π¦Rust
Flag this post
BONK Slides 4% as Support Break Sparks Renewed Technical Weakness
coindesk.comΒ·21h
πBrowser Exploitation
Flag this post
Canonical's Secure Starlark in Go
π¦Rust
Flag this post
ELA-1568-1 unbound1.9 security update
freexian.comΒ·18h
π¦Rust
Flag this post
Cisco: Partially critical security vulnerabilities in multiple products
heise.deΒ·1d
πBrowser Exploitation
Flag this post
OpenBSD CWM configuration breakdown
discoverbsd.comΒ·1d
π¦Rust
Flag this post
Malicious npm packages contain Vidar infostealer
infoworld.comΒ·11h
πBrowser Exploitation
Flag this post
Once upon a time this blog was powered by make
π¦Rust
Flag this post
An open-source conflict has emerged between Google and FFmpeg regarding AI-identified software vulnerabilities
πBrowser Exploitation
Flag this post
Reforging the ReScript Build System
π¦Rust
Flag this post
Putting the AI in TUI: When You Have 43 Minutes and a Commit Stuck in Your Head
erikzaadi.comΒ·4h
π¦Rust
Flag this post
Loading...Loading more...