The Great Firewall Part 1: The Dump
dti.domaintools.comยท1dยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
Malicious packages in NPM evade dependency detection through invisible URL links
csoonline.comยท11hยท
Discuss: Hacker News
๐Ÿ‘ปRootkits
Flag this post
Canada Says Hackers Tampered with ICS at Water Facility, Oil and Gas Firm
securityweek.comยท1dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท11hยท
Discuss: Hacker News
๐ŸeBPF
Flag this post
Beginners Guide to Building a Hardware Hacking Lab
voidstarsec.comยท16hยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
EY 4TB Data Leak
neosecurity.nlยท1dยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
socket.devยท1dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Flag this post
OpenAI unveils Aardvark, a GPT-5-powered agent for cybersecurity research
zdnet.comยท1dยท
Discuss: Hacker News
๐Ÿ›Fuzzing
Flag this post
Two Windows vulnerabilities, one a 0-day, are under active exploitation
arstechnica.comยท9hยท
Discuss: Hacker News
๐Ÿ“ฆSandboxing
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.comยท14hยท
Discuss: Hacker News
โ˜๏ธVirtualization
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.comยท19hยท
Discuss: Hacker News
๐Ÿ“ฆSandboxing
Flag this post
The Department of Defense Wants Less Proof its Software Works
eff.orgยท14hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
AI Red Teaming Guide
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
Designing Smarter Health Checks for Pomerium
pomerium.comยท1dยท
Discuss: Hacker News
๐ŸeBPF
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.comยท3dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Flag this post
Runs-On: Mac
runs-on-mac.comยท13hยท
Discuss: Hacker News
โ˜๏ธVirtualization
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comยท19hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท11hยท
Discuss: Hacker News
๐ŸeBPF
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.comยท1dยท
Discuss: Substack
๐Ÿ“ฆSandboxing
Flag this post
Punching Holes into Firewalls
sebsauvage.netยท1dยท
Discuss: Hacker News
๐ŸeBPF
Flag this post