threat intelligence, malware analysis, national security, nation state actors, apt, ttps 

Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.com·5h·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
socket.dev·2d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.com·2d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
Mitre ATT&CK v18 released
medium.com·34m·
Discuss: Hacker News
🔍reverse engineering
Flag this post
L16 Benchmark: How Prompt Framing Affects Truth, Drift, and Sycophancy in GEMMA-2B-IT vs PHI-2
colab.research.google.com·14h·
Discuss: r/LocalLLaMA
🧰WebAssembly Systems
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·3d·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.media·1d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.com·21h·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
OpenAI unveils Aardvark, a GPT-5-powered agent for cybersecurity research
zdnet.com·2d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Smaller Surfaces
nrempel.com·6h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.com·4d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
Ransomware gang runs ads for Microsoft Teams to pwn victims
theregister.com·1d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
AI Red Teaming Guide
github.com·2d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Speedrunning an RL Environment
sidb.in·17h·
Discuss: Hacker News
🔍reverse engineering
Flag this post
From Visibility to Verification: The Second Phase of AI Surface Governance
aivojournal.org·19h·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Malicious packages in NPM evade dependency detection through invisible URL links
csoonline.com·1d·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Osint Intelligence Analysis
opensourceintelligence.biz·1d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Major US Telecom Backbone Firm Hacked by Nation-State Actors
securityweek.com·2d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.org·3d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
Principles of Epistemology (2025, essay)
alexpeek.org·5h·
Discuss: Hacker News
🗄️SQLite
Flag this post