Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
📡Network Protocol Analysis
Flag this post
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
📡Network Protocol Analysis
Flag this post
Mitre ATT&CK v18 released
🔍reverse engineering
Flag this post
L16 Benchmark: How Prompt Framing Affects Truth, Drift, and Sycophancy in GEMMA-2B-IT vs PHI-2
🧰WebAssembly Systems
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
🧰WebAssembly Systems
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
🔍reverse engineering
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
📡Network Protocol Analysis
Flag this post
OpenAI unveils Aardvark, a GPT-5-powered agent for cybersecurity research
🔍reverse engineering
Flag this post
Smaller Surfaces
🧰WebAssembly Systems
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
📡Network Protocol Analysis
Flag this post
AI Red Teaming Guide
🔍reverse engineering
Flag this post
Speedrunning an RL Environment
🔍reverse engineering
Flag this post
From Visibility to Verification: The Second Phase of AI Surface Governance
🔍reverse engineering
Flag this post
Malicious packages in NPM evade dependency detection through invisible URL links
🧰WebAssembly Systems
Flag this post
Osint Intelligence Analysis
🔍reverse engineering
Flag this post
Major US Telecom Backbone Firm Hacked by Nation-State Actors
📡Network Protocol Analysis
Flag this post
Principles of Epistemology (2025, essay)
🗄️SQLite
Flag this post
Loading...Loading more...