Evading AV and EDR solutions
dev.to·15h·
Discuss: DEV
🕵️Memory Forensics
Flag this post
AI scrapers request commented scripts
cryptography.dog·6h·
🔍AI Detection
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·2h
🛡️Memory Safety
Flag this post
Exhaustive Guide to Generative and Predictive AI in AppSec
qwiet.ai·13h·
Discuss: DEV
📋Tokei
Flag this post
Enhancing ECG Classification Robustness with Lightweight Unsupervised Anomaly Detection Filters
arxiv.org·18h
⏱️Real-time Analytics
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·10h·
Discuss: Hacker News
🔍AI Detection
Flag this post
Generative and Predictive AI in Application Security: A Comprehensive Guide
dev.to·14h·
Discuss: DEV
🔍AI Detection
Flag this post
Ransomware gang runs ads for Microsoft Teams to pwn victims
theregister.com·3h
🏞️Delta Lake
Flag this post
UNC6384 Targets European Diplomatic Entities With Windows Exploit
darkreading.com·2h
📊Data Lineage
Flag this post
Wuzen 2025 Analysis: The Android RAT That's Raising the Bar for Mobile Security Threats
dev.to·22h·
Discuss: DEV
📋Tokei
Flag this post
From Beginner to Cyber-Aware: Lessons from My First Cybersecurity Course
netacad.com·21h·
Discuss: DEV
🛡️Memory Safety
Flag this post
Proton's new observatory reveals over 100 billion records breached - here's what you need to know
techradar.com·4h
🏺Data Archaeology
Flag this post
Rdza – Rust Programming, in Polish
github.com·12h·
Discuss: Hacker News
🦀Rust Scientific
Flag this post
Today I Learned: Binfmt_misc
dfir.ch·13h·
Discuss: Hacker News
🛡️Memory Safety
Flag this post
AI browsers are here, and they're already being hacked - NBC News
news.google.com·6h
🔍AI Detection
Flag this post
Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan
dev.to·23h·
Discuss: DEV
🕵️Memory Forensics
Flag this post
Cloud CISO Perspectives: AI as a strategic imperative to manage risk
cloud.google.com·6h
📊Data Lineage
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·3h·
Discuss: Hacker News
🕵️Memory Forensics
Flag this post
Stop Writing Code, Start Writing Docs
thenewstack.io·3h
📋Tokei
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.com·11h·
Discuss: Hacker News
🏗data engineering
Flag this post