youbecks's Top FindsLoading...
3 times Nintendo showed how much it hates emulation and piracy
xda-developers.com·4h
Flag this post
Speechcrime
city-journal.org·15h
🦹cybercrime
Flag this post
European Commission GDPR modification to “KILL” cookie consent nightmare
blog.lukaszolejnik.com·13h
Flag this post
Linux Privilege Escalation reference for all things
github.com·1h·
Discuss: Hacker News
Flag this post
Why people dont demand data privacy – even as governments and corporations collect more personal information ( Opinion )
dailycamera.com·11h
🦹cybercrime
Flag this post
Google Chrome to Show Stronger Warnings for Insecure HTTP Sites Starting October 2025
blogger.com·13h
🦹cybercrime
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
infosecwriteups.com·19h
💥Cyberattack
Flag this post
AI/ LLM Hacking — Part 6 — Excessive Agency | Insecure Plugin
infosecwriteups.com·19h
💥Cyberattack
Flag this post
Staying Ahead of Evolving Security Threats
magazine.cs.cmu.edu·2d
🦹cybercrime
Flag this post
Cybercriminals Target Fans Ahead of 2026 FIFA World Cup, Norton Warns
blogger.com·2d
🦹cybercrime
Flag this post
CyberGhost DMCAs Our Story About Their Bogus DMCA (Yes, Really)
techdirt.com·2d·
Discuss: Hacker News
🦹cybercrime
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.com·2d
💥Cyberattack
Flag this post
AIjacking Threat Exposed: How Hackers Hijacked Microsoft’s Copilot Agent Without a Single Click
blogger.com·2d
💥Cyberattack
Flag this post
Cybersecurity Weekly #7: How AI Is Boosting Threat Detection for Freelancers & Small Businesses in 2025
future.forem.com·2d·
Discuss: DEV
🔍Cyber threat intelligence
Flag this post
Unicode Normalization Attacks: When "admin" ≠ "admin" 🔤
instatunnel.my·2d·
Discuss: r/devops
💥Cyberattack
Flag this post
NPM supply chain attacks with Charlie Erickson
opensourcesecurity.io·4h
Flag this post
Google Security Researchers ID AI-Powered Malware Used in Real World Cyberattack
axios.com·4d
💥Cyberattack
Flag this post
High-Severity Vulnerability CVE-2024-0670 Puts Checkmk Windows Agents at Risk
thecybersecguru.com·13h
💥Cyberattack
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·3d
💥Cyberattack
Flag this post