Cryptography, Authentication, Authorization, Secure Protocols, Threat Modeling

Credentials Evidence or Simulate
preludes.euยท5hยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท7hยท
Discuss: Hacker News
๐ŸŒNetworking
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท13h
๐Ÿ”ฌeBPF
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsยท7hยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post
What's Next in Customer Identity and Access Management
kuppingercole.comยท2hยท
Discuss: Hacker News
๐Ÿ’พStorage Systems
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.netยท1dยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post
How Can eLearning Platforms Ensure Data Safety?
elearningindustry.comยท9h
๐Ÿ”ŒAPI Design
Flag this post
Will we EVER learn? The most common passwords are revealed - with '123456' topping the list yet again
dailymail.co.ukยท10h
๐Ÿ”ฌeBPF
Flag this post
Ribbon Targeted in Cyber Espionage Campaign by Nation-State Actors
blogger.comยท12h
๐Ÿ”ฌeBPF
Flag this post
OVHcloud: Quantum random number generation SSL certificates for all customers
blog.ovhcloud.comยท11hยท
Discuss: Hacker News
๐Ÿ”ฌeBPF
Flag this post
Hackers Weaponize Remote Tools to Hijack Cargo Freight
darkreading.comยท6h
๐Ÿ”ฌeBPF
Flag this post
starting my privacy journey - would apple be a bad choice?
discuss.privacyguides.netยท1d
๐Ÿ’ปOperating Systems
Flag this post
Smarter Safety with AI + Vision: A Tech Blog on Industrial Risk Monitoring
dev.toยท7hยท
Discuss: DEV
๐Ÿ”ฌeBPF
Flag this post
Building Software That Survives โ€ข Michael Nygard & Charles Humble โ€ข GOTO 2025
youtube.comยท12h
๐Ÿ”ฌeBPF
Flag this post
OAuth Device Code Phishing: Azure vs. Google Compared
bleepingcomputer.comยท9hยท
Discuss: Hacker News
๐Ÿ”ŒAPI Design
Flag this post
Musk's XChat is Safe as "Bitcoin-style" peer-to-peer encryption?
pbxscience.comยท4hยท
Discuss: Hacker News
๐Ÿ”ŒAPI Design
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.plยท15h
๐Ÿ”ฌeBPF
Flag this post
Navigating The Next Era Of Digital Investigations: A Thought Leadership Perspective
forensicfocus.comยท14h
๐Ÿ’พStorage Systems
Flag this post
Ground zero: 5 things to do after discovering a cyberattack
welivesecurity.comยท15h
๐Ÿ“ŠMonitoring
Flag this post