ELA-1568-1 unbound1.9 security update
freexian.comยท1d
๐ฆRust
Flag this post
The Scariest Lines of Code I've Ever Written
๐ฆRust
Flag this post
Moves Are Broken
๐Fuzzing
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.comยท4d
๐Browser Exploitation
Flag this post
Teach Your AI to Think Like a Senior Engineer
kill-the-newsletter.comยท10h
๐ฆRust
Flag this post
AI Slop vs. OSS Security
๐Browser Exploitation
Flag this post
Cisco fixes critical UCCX flaw allowing Root command execution
securityaffairs.comยท17h
๐Browser Exploitation
Flag this post
I Built a File-Hiding App Because I Didn't Know Any Better (And It Actually Works!)
๐Browser Exploitation
Flag this post
AIjacking Threat Exposed: How Hackers Hijacked Microsoftโs Copilot Agent Without a Single Click
blogger.comยท13h
๐Security
Flag this post
Integrity Under Siege: A Rogue gNodeB's Manipulation of 5G Network Slice Allocation
arxiv.orgยท2d
๐Browser Exploitation
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท3d
๐Security
Flag this post
I built Scrype, a library for devs who want a cool way to showcase their code. Looking for feedback!
๐Browser Exploitation
Flag this post
Balancing Leakage Reduction with Correctness Preservation in RTL Code Generation (Univ. of Central Florida)
semiengineering.comยท1d
๐Reverse Engineering
Flag this post
Loading...Loading more...