Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·13h·
Discuss: Hacker News
SIMD Optimization
A Small Tool to Understand How Spam Filtering Works
dev.to·21h·
Discuss: DEV
🧮Apache Calcite
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.com·7h
🛡️Memory Safety
The Invisible Character That Cost Me Too Much Debugging Time
blog.dochia.dev·10h·
Discuss: r/programming
🏗data engineering
Huntress's 'hilarious' attacker surveillance splits infosec community
theregister.com·14h·
Discuss: Hacker News
📋Tokei
Keep an eye on your Meta Business account, these fake extensions could steal your credentials
techradar.com·3h
🔍AI Detection
Team Atlanta
team-atlanta.github.io·6h·
Discuss: Lobsters
🔍AI Detection
Shamos malware tricks Mac users with fake fixes
foxnews.com·4h
🕵️Memory Forensics
The Silent Thief in Your Code: When AI Assistants Get Hacked
dev.to·23h·
Discuss: DEV
🔍AI Detection
Setting up rooted Android emulator with Frida and mitmproxy
trickster.dev·21h·
Discuss: Hacker News
📋Tokei
EggStreme: New Fileless Malware from a Chinese Apt Targets Philippine Military
securityonline.info·20h·
Discuss: Hacker News
🕵️Memory Forensics
Strengthening our safeguards through collaboration with US CAISI and UK AISI
anthropic.com·21h
🔍AI Detection
The reference genome of the human diploid cell line RPE-1
nature.com·11h
🧬Bioinformatics
LLM-Generated Rules Engines for LLM Explainability
brain.co·9h·
Discuss: Hacker News
🔄Feed Aggregation
Shielding High-Demand Systems from Fraud
ipsator.com·12h·
Discuss: r/programming
📊Data Lineage
9 Best Practices for API Security ⚔️
newsletter.systemdesign.one·12h
🛡️Memory Safety
Decompiling the GPL violated Linux kernel using Evolutionary Algorithms
far.chickenkiller.com·13h·
Discuss: Hacker News
⚙️Query Compilers
Why Python is Revolutionizing Cybersecurity: The Psychology-Driven Approach That's Changing Everything
dev.to·2h·
Discuss: DEV
🧭Behavioral Bioinformatics