Security news weekly round-up - 12th September 2025
dev.to·21m·
Discuss: DEV
🦠Malware Analysis
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·13h·
Discuss: Hacker News
🦠Malware Analysis
MetaRAG: Metamorphic Testing for Hallucination Detection in RAG Systems
arxiv.org·17h
DataFusion
Team Atlanta
team-atlanta.github.io·6h·
Discuss: Lobsters
🔍AI Detection
Optimizing 100B ClickHouse Events
replo.computer·16h·
Discuss: Hacker News
ClickHouse
The Invisible Character That Cost Me Too Much Debugging Time
blog.dochia.dev·9h·
Discuss: r/programming
🏗data engineering
Tuning guide for AMD Amazon EC2 instances
aws.amazon.com·2h
📈Performance Profiling
Show HN: Root Managed Services
rootmanagedservices.com·17h·
Discuss: Hacker News
🗄️Storage Tiering
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.ch·16h·
🛡️Memory Safety
Don't Let Your Mocks Mock You
revontulet.dev·2h·
Discuss: Hacker News
⏱️benchmarking
Orange Crabs in the Machine: How Rust is rewriting the rules of modern software
geekwire.com·5h
🦀Rust Scientific
A Breadboard Computer in Three Chips
hackaday.com·1h
🏗️Hardware Architecture
Forging Data Symphonies: The Art of the ETL Pipeline in Rails
github.com·22h·
Discuss: DEV
🧊Iceberg Tables
Humpty Dumpty caper at New Jersey mini-golf course sparks police investigation
independent.co.uk·23h
🎲Game Theory
Early Bytes of Creativity – Forgotten Mainframe Games, Part I (2023)
zeitgame.net·4h·
Discuss: Lobsters
🧊Iceberg Tables
OpenSSF Experts Weigh in on CISA’s SBOM Minimum Elements Update
thenewstack.io·5h
📋Tokei
EggStreme: New Fileless Malware from a Chinese Apt Targets Philippine Military
securityonline.info·19h·
Discuss: Hacker News
🦠Malware Analysis
Atom-thin crystals provide new way to power the future of computer memory
phys.org·7h
🧬Quantum Biology
Smart Log Anomaly Detection with Python and Isolation Forest
dev.to·6h·
Discuss: DEV
🔍AI Detection