Deleteduser.com a $15 PII Magnet

Drop-in iframe embed widgets for a curated security library

Someone bought 30 WordPress plugins and planted a backdoor in all of them

Command Execution via Drag-and-Drop in Terminal Emulators

Anthropic's Mythos Model Is Being Accessed by Unauthorized Users

Secure signatures without a private key

POLA Would Have Prevented the Event-Stream Incident (2018)

KeePass· - a KeePassXC fork

Put your SSH keys in your TPM chip

Booking.com Hit By Data Breach

Linux application sandboxing - old tech for the future

CPU-Z and HWMonitor compromised

Discourse Is Not Going Closed Source

Rewriting Every Syscall in a Linux Binary at Load Time

Towards trust in Emacs

Cybersecurity looks like proof of work now

A Boy That Cried Mythos: Verification Is Collapsing Trust in Anthropic

Why Nobody Can Verify What Booted Your Server

GitHub Actions is the weakest link

NIST Limits CVE Enrichment After 263% Surge In Vulnerability Submissions

Email is crazy

Removing the AUICGP instruction

The Mac App Gold Rush in the Age of Vibe Coding

Flatpak: Complete Sandbox Escape

The zero-days are numbered

Offensive Cybersecurity Time Horizons

AppArmor's experimental permissions prompting (2024)

Encrypting an external device with LUKS

Iran-Linked Hackers Disrupted US Oil, Gas, Water Sites

Cloudflare targets 2029 for full post-quantum security

More →