Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Let's Encrypt is 10 years old now

TIL: Some surprising code execution sources in bash

Breaking CityHash64, MurmurHash2/3, wyhash, and more

Go-Safeweb

Using Large Language Models to Catch Vulnerabilities

Writing secure Go code

A Survey of Protocol Fuzzing

Paged Out! Issue #5

Hyperlight: Virtual machine-based security for functions at scale

D-Link tells users to trash old VPN routers over bug too dangerous to identify

Inside the Massive Crime Industry That's Hacking Billion-Dollar Companies

Reverse Engineering iOS 18 Inactivity Reboot

Security Engineering - A Guide to Building Dependable Distributed Systems

How XBOW found a Scoold authentication bypass

Attack of the Evil Baristas

GitHub offering security tools, advice to Open Source Projects

Security means securing people where they are

Who Is Eric Wayne?: An Unsolved IoT Mystery

How Italy Became an Unexpected Spyware Hub

National Security Just Called, They Can't See the Email Traffic

On That Okta LDAP Bug

Multiple new macOS sandbox escape vulnerabilities

Flouting the Internet Protocols with Tunnels

Hundreds of code libraries posted to NPM try to install malware on dev machines

Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root

Understanding Trust Relationships in Cloud-Based Confidential Computing

DataBreach.com Emerges As Alternative To HaveIBeenPwned

Local privilege escalation via needrestart

oss-sec: shell wildcard expansion (un)safety

Known Attacks On Elliptic Curve Cryptography

More →