programming.dev - security programming.dev
<p>A community for discussion about cybersecurity, hacking, cybersecurity news, exploits, bounties etc.</p> <p><strong>Rules</strong> :</p> <ol> <li>All instance-wide rules apply.</li> <li>Keep it totally legal.</li> <li>Remember the human, be civil.</li> <li>Be helpful, don’t be rude.</li> </ol> <p>Icon base by <a href="https://delapouite.com/" rel="nofollow">Delapouite</a> under <a href="https://creativecommons.org/licenses/by/3.0/" rel="nofollow">CC BY 3.0</a> with modifications to add a gradient</p>
How to Ruin All of Package Management
programming.dev·7h
SVG Filters
programming.dev·2w
We Hacked Flock Safety Cameras in under 30 Seconds - Benn Jordan (YouTube, 40 min)
programming.dev·5w
How to check if Tor Onion Service is alive?
programming.dev·7w
The Hidden Vulnerabilities of Open Source - Revisiting and Contextualizing the designed xz backdoor, multi-year-long effort
programming.dev·16w
ChatGPT's o3 Model Found Remote Zeroday in Linux Kernel Code
programming.dev·30w
Millions of Apple Airplay-enabled devices can be hacked via Wi-Fi
programming.dev·34w
Site Attestation: Browser-based Remote Attestation
programming.dev·35w
‘Vibe coding’ using LLMs susceptible to most common security flaws
programming.dev·35w
Homeland Security funding for CVE program expires
programming.dev·36w
Announcing OpenGrep - Open-source static code analysis tool
programming.dev·48w
Humble Tech Book Bundle: Hacking 2024 by No Starch
programming.dev·55w
Cryptography DEEPEST LORE
programming.dev·65w
Microsoft starts developing tools to prevent another global IT outage
programming.dev·66w
DroidFS v2.2.0
programming.dev·73w
Loading...Loading more...