Cryptography, Authentication, Authorization, Secure Protocols, Threat Modeling

The Art of the Command Line
jxself.orgΒ·12h
πŸ¦€Rust
Flag this post
Apple releases iOS and iPadOS 18.7.2 with lots of security updates
macworld.comΒ·14h
πŸ’»Operating Systems
Flag this post
WhatsApp Boosts Privacy with Passkey Encryption for Chat Backups
smallbiztrends.comΒ·1d
πŸ”¬eBPF
Flag this post
The Surge in Cyberattacks in Hispanoamerica and China’s Digital Expansion Drive a New Technological...
gatewayhispanic.comΒ·2d
🌐Networking
Flag this post
Bayesian prediction of aerospace system mission reliability with hierarchical and multi-fidelity test data fusion
sciencedirect.comΒ·18h
πŸ”¬eBPF
Flag this post
How can we keep our society and economy cyber secure?
newstatesman.comΒ·1d
πŸ”¬eBPF
Flag this post
Data is the new geopolitical fault line
techradar.comΒ·24m
☁️Cloud Computing
Flag this post
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
thehackernews.comΒ·1d
πŸ”¬eBPF
Flag this post
7 Questions EDR Providers Hope You Won’t Ask About Their β€œExposure Management” Solution
tenable.comΒ·20h
πŸ”¬eBPF
Flag this post
Some thoughts on AI and coding
infoworld.comΒ·1d
☁️Cloud Computing
Flag this post
MDM for Family devices
reddit.comΒ·1dΒ·
Discuss: r/privacy
πŸ’»Operating Systems
Flag this post
Kubernetes Training material
reddit.comΒ·1dΒ·
Discuss: r/kubernetes
🐳Docker
Flag this post
A 2032 Takeoff Story
lesswrong.comΒ·9h
☁️Cloud Computing
Flag this post
Smarter Safety with AI + Vision: A Tech Blog on Industrial Risk Monitoring
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”¬eBPF
Flag this post
Louvre Heist Fallout Reveals Museum’s Video Security Password Was β€˜Louvre’
vice.comΒ·14h
πŸ”¬eBPF
Flag this post
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
thehackernews.comΒ·2h
πŸ”¬eBPF
Flag this post
List Decoding and New Bicycle Code Constructions for Quantum LDPC Codes
arxiv.orgΒ·5h
πŸ”¬eBPF
Flag this post
Introducing YasuiJS β€” A Modern, Minimal REST Framework for Any Runtime
dev.toΒ·6hΒ·
Discuss: DEV
πŸ”ŒAPI Design
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.comΒ·1d
πŸ”¬eBPF
Flag this post