Security news weekly round-up - 12th September 2025
dev.to·3h·
Discuss: DEV
🦠Malware Analysis
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·16h·
Discuss: Hacker News
🦠Malware Analysis
MetaRAG: Metamorphic Testing for Hallucination Detection in RAG Systems
arxiv.org·20h
DataFusion
Choosing Between On-Premises and Cloud SQL Hosting: What Businesses Should Consider
trilio.io·16m·
Discuss: DEV
⚙️Database Internals
Team Atlanta
team-atlanta.github.io·9h·
Discuss: Lobsters
🔍AI Detection
Optimizing 100B ClickHouse Events
replo.computer·19h·
Discuss: Hacker News
ClickHouse
The Invisible Character That Cost Me Too Much Debugging Time
blog.dochia.dev·13h·
Discuss: r/programming
🏗data engineering
Tuning guide for AMD Amazon EC2 instances
aws.amazon.com·5h
📈Performance Profiling
Show HN: Root Managed Services
rootmanagedservices.com·20h·
Discuss: Hacker News
🗄️Storage Tiering
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.ch·19h·
🛡️Memory Safety
Don't Let Your Mocks Mock You
revontulet.dev·5h·
Discuss: Hacker News
⏱️benchmarking
Orange Crabs in the Machine: How Rust is rewriting the rules of modern software
geekwire.com·9h
🦀Rust Scientific
A Breadboard Computer in Three Chips
hackaday.com·4h
🏗️Hardware Architecture
Early Bytes of Creativity – Forgotten Mainframe Games, Part I (2023)
zeitgame.net·7h·
Discuss: Lobsters
🧊Iceberg Tables
OpenSSF Experts Weigh in on CISA’s SBOM Minimum Elements Update
thenewstack.io·8h
📋Tokei
EggStreme: New Fileless Malware from a Chinese Apt Targets Philippine Military
securityonline.info·23h·
Discuss: Hacker News
🦠Malware Analysis
Atom-thin crystals provide new way to power the future of computer memory
phys.org·11h
🧬Quantum Biology
Smart Log Anomaly Detection with Python and Isolation Forest
dev.to·9h·
Discuss: DEV
🔍AI Detection
LLM-Generated Rules Engines for LLM Explainability
brain.co·12h·
Discuss: Hacker News
🔄Feed Aggregation