Cryptography, Authentication, Authorization, Secure Protocols, Threat Modeling

ESCAL8 2025: Gathering Cybersecurity Expertise in Mexico City
bughunters.google.comΒ·2d
🌐Networking
Flag this post
New homepage for YINI is now up live! β€” a modern, structured config format
yini-lang.orgΒ·15hΒ·
Discuss: r/programming
🐹Go
Flag this post
Design principles for teams working in healthcare
mikegallagher.orgΒ·3d
πŸ”¬eBPF
Flag this post
Top 7 features in Windows 11’s November 11, 2025, update β€” AI, Start menu, and more
windowscentral.comΒ·1d
πŸ’»Operating Systems
Flag this post
Britain’s Digital ID Push Is Premature and Dangerous
coindesk.comΒ·4d
πŸ”¬eBPF
Flag this post
Take control of your privacy with updates on Malwarebytes for Windows
malwarebytes.comΒ·3d
πŸ”¬eBPF
Flag this post
Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
unit42.paloaltonetworks.comΒ·4d
πŸ”¬eBPF
Flag this post
HAP v2 - a declarative HTTP framework for rapid API service development
pkg.go.devΒ·3d
πŸ”ŒAPI Design
Flag this post
...Partnerships, Funding, and Emerging Threats – November 6, 2025 (Hack The Box, Malanta, Inspira...
hipther.comΒ·2d
πŸ”¬eBPF
Flag this post
Stop Slicing Data: How Network Analysis Uncovers Hidden Relationships in Your Flat Datasets
dev.toΒ·1dΒ·
Discuss: DEV
🌐Networking
Flag this post
How I Used AI to Become Someone Else (And Why Your Face Is No Longer Your Password)
infosecwriteups.comΒ·7h
βš™Backend Engineering
Flag this post
How We're Trying to Solve Vibe-Coded PRs
idiallo.comΒ·5h
☁️Cloud Computing
Flag this post
Smart Surveillance - Using Computer Vision for Safer Public Spaces
dev.toΒ·3dΒ·
Discuss: DEV
πŸ“ŠMonitoring
Flag this post
Show HN: Pipeflow-PHP – Automate anything with pipelines even non-devs can edit
github.comΒ·3hΒ·
Discuss: Hacker News
βš™Backend Engineering
Flag this post
Crypto for Advisors: What is DeFi?
coindesk.comΒ·3d
☁️Cloud Computing
Flag this post
Millions Of Accounts At Risk: New Study Names Worst Passwords Of 2025
hothardware.comΒ·2d
πŸ’»Operating Systems
Flag this post
The JVM’s Greatest Irony: Brilliant Engineering, Painful Scripting
dev.toΒ·1dΒ·
Discuss: DEV
πŸ•ΈοΈWebAssembly
Flag this post
Why SafeLine is better than traditional WAF
dev.toΒ·3dΒ·
Discuss: DEV
πŸ”¬eBPF
Flag this post
Legal Entanglement
arxiv.orgΒ·2d
πŸ”—Distributed Systems
Flag this post
Password, 2fa, and their backups management, need critique!
discuss.privacyguides.netΒ·1d
πŸ”¬eBPF
Flag this post