threat intelligence, malware analysis, national security, nation state actors, apt, ttps 

We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·10h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.com·1d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
koi.ai·4h·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Introducing SWE-1.5: Our Fast Agent Model
simonwillison.net·2h
🔍reverse engineering
Flag this post
More Than 70% of DNS Root Queries Are Junk
pulse.internetsociety.org·15h·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
Show HN: Secure Extensions Marketplace for Chrome,Edge,Firefox,VSCode,NPM
browsertotal.com·10h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Scalable Static Analysis Framework – hardening large C++ codebases (LLVM/Apple)
discourse.llvm.org·1h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Just don't see any business use case for it
reddit.com·4h·
Discuss: r/LocalLLaMA
🖥homelab
Flag this post
Guiding AI Agents Through Error Messages
maybedont.ai·1d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
F5 Is Misleading the Market – The Breach Is Nowhere Near Contained
reporter.deepspecter.com·7h·
Discuss: Hacker News
🔍reverse engineering
Flag this post
How Signal uses Rust to secure the communications of millions of people
kerkour.com·20h·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
Scam: Inside South-East Asia's Cybercrime Compounds
lrb.co.uk·8h·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
"The Bug Hunt" blog post pattern
writethatblog.substack.com·13h·
Discuss: Substack
🔍reverse engineering
Flag this post
Incident Diagnosis in a Symptom-Based World
runbooks.gitlab-static.net·15h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Graphing the Ransomware Payment Ecosystem Using STIX Objects
dogesec.com·2d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Aisuru Botnet Shifts from DDoS to Residential Proxies
krebsonsecurity.com·1d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
Add a clean frontend to any agent
i.redd.it·7h·
Discuss: r/LocalLLaMA
🧰WebAssembly Systems
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·9h·
Discuss: Hacker News
🔍reverse engineering
Flag this post
The Internet Runs on Free and Open Source Software–and So Does the DNS
icann.org·7h·
🖥homelab
Flag this post
Cognition Releases SWE-1.5: Near-SOTA Coding Performance at 950 tok/s
cognition.ai·3h·
Discuss: Hacker News
🔍reverse engineering
Flag this post