Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

There were BGP anomalies during the Venezuela blackout

Runjak.codes: An adversarial coding test

Claude Cowork exfiltrates files

Overrun with AI slop, cURL scraps bug bounties to ensure "intact mental health"

Signal creator Moxie Marlinspike wants to do for AI what he did for messaging

The Malloc Maleficarum (2005)

How Safe is the Rust Ecosystem? A Deep Dive into crates.io

Secure Boot, TPM and Anti-Cheat Engines

A field guide to sandboxes for AI

StackWarp Vulnerability

Never-before-seen Linux malware is "more advanced than typical"

Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters

Malware Peddlers Are Now Hijacking Snap Publisher Domains

Exploit Cursor Agents to create persistent, distributed threats

Patela v2: From certificates to hardware

Predator Spyware Turns Failed Attacks Into Intelligence For Future Exploits

6-Day and IP Address Certificates Are Generally Available

Fintech Firm Betterment Confirms Data Breach After Hackers Send Fake $10,000 Crypto Scam Messages

A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

To Pressure Security Professionals, Mandiant Releases Database That Cracks Weak NTLM Passwords in 12 Hours

Decorative Cryptography

The Kimwolf botnet is stalking your local network

Everything You Need to Know About Email Encryption in 2026

One Thousand Words

Reducing Dependabot Noise

I’m The Captain Now: Hijacking a global ocean supply chain network

Linux kernel security work

A Typical PDF

WhatsApp is untrustable

How GitHub could secure npm

More →