Denard.me
  • Blog
  • Dashboard
    • Dashboard
    • - Security Experts
    • - Security Operations
    • - Application Security
    • - Sysadmin
    • - Tech News
  • Services
  • Archives
  • Résumé
  • Contact

Security Experts

Anthony Ferrara

  • Wiring a Home Network
  • A PHP Compiler, aka The FFI Rabbit Hole
  • Protecting Against XSS In RAILS - JavaScript Contexts
  • Disclosure: WordPress WPDB SQL Injection - Technical
  • Disclosure: WordPress WPDB SQL Injection - Background
  • Ponderings on Odoriferous Syntactical Constructifications
  • Building an 8-bit Computer
  • Trust
  • All About Middleware
  • Simple, Easy, Risk and Change

Chris Hoff

  • On building fire extinguishers and fighting fires…
  • The 3 Immutable Rules Of Presentations…
  • Looking Forward to Catching Up At RSA…
  • Attribution is the new black…what’s in a name, anyway?
  • The Active Response Continuum & The Right To Cyber Self Defense…
  • Incomplete Thought: The Time Is Now For OCP-like White Box Security Appliances
  • J-Law Nudie Pics, Jeremiah, Privacy and Dropbox – An Epic FAIL of Mutual Distraction
  • How To Be a Cloud Mogul(l) – Our 2014 RSA “Dueling Banjos/Cloud/DevOps” Talk
  • On the Topic Of ‘Stopping’ DDoS.
  • The Easiest $20 I ever saved…

Dan Kaminsky: Blog

  • IRS Tax Refund Schedule for 2026: Expected Amounts and Payment Dates
  • Philadelphia Files Lawsuit Against Trump Administration Over Removal of Slavery Exhibit
  • Upcoming SSI Payments Will Arrive on Different Dates — Here’s the Explanation
  • Social Security Spousal Benefits in 2026: Eligibility, Payment Amounts, and How to Claim
  • Social Security Payment Dates for 2026: When to Expect Your Benefits
  • Behavioral Scientists Say That People Who Walk Faster Than Average Consistently Share the Same Indicators …
  • Many People Don’t Realise it, But Cauliflower, Broccoli and Cabbage are Varieties of the Same …
  • Winter Storm Warning Issued as Up to 65 Inches of Snow Threaten to Overwhelm Emergency …
  • The Psychology Behind Wearing Red in Negotiations to Project Confidence and Dominance
  • Winter Storm Warning Issued as 70-MPH Winds and Up to Three Feet of Snow Arrive …

Elliptic News

  • Celebrating 40 years of Elliptic Curves in Cryptography (ECC), August 11, 2025
  • 25th Workshop on Elliptic Curve Cryptography, Taipei, Taiwan, Oct 30 – Nov 1, 2024
  • New cryptanalysis of M-SIDH isogeny cryptography
  • SIAM Conference on Applied Algebraic Geometry (AG23)
  • Some comments on the CSIDH group action
  • Equivalence between CDH and DLP
  • EdDSA standardized
  • Attacks on SIDH/SIKE
  • Breaking supersingular isogeny Diffie-Hellman (SIDH)
  • Hertzbleed Attack

Fillipio

  • Turn Dependabot Off
  • Inspecting the Source of Go Modules
  • go.sum Is Not a Lockfile
  • Building a Transparent Keyserver
  • The 2025 Go Cryptography State of the Union
  • Claude Code Can Debug Low-level Cryptography
  • The Geomys Standard of Care
  • A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
  • Maintainers of Last Resort
  • Cross-Site Request Forgery

Graham Cluley

  • Twitter suspended 800 million accounts last year – so why does manipulation remain so rampant?
  • How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut …
  • Smashing Security podcast #457: How a cybersecurity boss framed his own employee
  • They seized $4.8m in crypto… then gave the master key to the internet
  • Your staff are your biggest security risk: AI is making it worse
  • Notorious ransomware gang allegedly blackmailed by fake FSB officer
  • Smashing Security podcast #456: How to lose friends and DDoS people
  • $10,000 bounty offered if you can hack Ring cameras to stop them sharing your data …
  • Spanish police say they have arrested hacker who booked luxury hotel rooms for just one …
  • Smashing Security podcast #455: Face off: Meta’s Glasses and America’s internet kill switch

Krebs on Security

  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
  • Microsoft Patch Tuesday, March 2026 Edition
  • How AI Assistants are Moving the Security Goalposts
  • Who is the Kimwolf Botmaster “Dort”?
  • ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
  • Kimwolf Botnet Swamps Anonymity Network I2P
  • Patch Tuesday, February 2026 Edition
  • Please Don’t Feed the Scattered Lapsus ShinyHunters
  • Who Operates the Badbox 2.0 Botnet?
  • Kimwolf Botnet Lurking in Corporate, Govt. Networks

Lenny Zeltser

  • Building Security Products for SMBs
  • A Practitioner's Guide to Creating Cybersecurity Products
  • From Chief Opinion Officer to Action-Taker
  • What Being a CISO Taught Me About Security Leadership
  • REMnux v8: 15 Years of Building a Malware Analysis Toolkit
  • Using AI Agents to Analyze Malware on REMnux
  • The Chief Insecurity Officer
  • Escaping the Vulnerability Management Hamster Wheel
  • Interactive Replays of Conversations: A New Tool
  • Write Good Incident Response Reports Using Your AI Tool

The MPC Lounge

  • 5th Bar-Ilan Winter School 2015: Advances in Practical Multiparty Computation
  • Publicly Auditable Secure Multiparty Computation
  • Faster Maliciously Secure Two-Party Computation Using the GPU
  • Adapt, adapt, adapt
  • MiniTrix for MiniMacs
  • Categorizing MPC
  • Communication-Efficient MPC for General Adversary Structures
  • Fair enough
  • How to use bitcoin to design fair protocols
  • Round-efficient black-box constructions of composable multi-party computation

Root Labs rdist

  • Rebooting
  • In Which You Get a Chance to Save Democracy
  • Was the past better than now?
  • Thought experiment on protocols and noise
  • Timing-safe memcmp and API parity
  • In Defense of JavaScript Crypto

Russ McRee

  • Moving blog to HolisticInfoSec.io
  • toolsmith #133 - Anomaly Detection & Threat Hunting with Anomalize
  • toolsmith #132 - The HELK vs APTSimulator - Part 2
  • toolsmith #131 - The HELK vs APTSimulator - Part 1
  • toolsmith #130 - OSINT with Buscador
  • toolsmith #129 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 2
  • McRee added to ISSA's Honor Roll for Lifetime Achievement
  • toolsmith #128 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 1
  • Toolsmith Tidbit: Windows Auditing with WINspect
  • Toolsmith Release Advisory: Magic Unicorn v2.8

Schneier on Security

  • Canada Needs Nationalized, Public AI
  • Jailbreaking the F-35 Fighter Jet
  • New Attack Against Wi-Fi
  • Friday Squid Blogging: Squid in Byzantine Monk Cooking
  • Anthropic and the Pentagon
  • Claude Used to Hack Mexican Government
  • Israel Hacked Traffic Cameras in Iran
  • Hacked App Part of US/Israeli Propaganda Campaign Against Iran
  • Manipulating AI Summarization Features
  • On Moltbook

Shtetl-Optimized

  • Remarks at UT on the Pentagon/Anthropic situation
  • The ”JVG algorithm” is crap
  • Moar Updatez
  • Anthropic: Stay strong!
  • Updatez!
  • On reducing the cost of breaking RSA-2048 to 100,000 physical qubits
  • “My Optimistic Vision for 2050”
  • Nate Soares visiting UT Austin tomorrow!
  • Luca Trevisan Award for Expository Work
  • The time I didn’t meet Jeffrey Epstein

Troy Hunt

  • Weekly Update 494
  • Weekly Update 493
  • Weekly Update 492
  • Weekly Update 491
  • Weekly Update 490
  • Weekly Update 489
  • Weekly Update 488
  • Weekly Update 487
  • Weekly Update 486
  • Who Decides Who Doesn’t Deserve Privacy?

Xavier Mertens

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?
  • [SANS ISC] Quick Malware Triage With Inotify Tools
  • [SANS ISC] From a Zalando Phishing to a RAT
  • [SANS ISC] Show me All Your Windows!
  • [SANS ISC] Are Leaked Credentials Dumps Used by Attackers?
  • [SANS ISC] Do Attackers Pay More Attention to IPv6?

Sec Ops

Checkpoint

  • Augmented Phishing: Social Engineering in the Age of AI
  • Global Cyber Attacks Remain Near Record Highs in February 2026 Despite Ransomware Decline
  • China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions
  • Introducing CPR Act: A Unified Approach for a Full‑Lifecycle Security
  • Powering Cyber Resilience Across APAC: Celebrating Check Point’s APAC FY25 Partner Award Winners
  • The Whitelist Illusion – When Your Trusted List Becomes a Billion Dollar Attack Path
  • Silver Dragon: China Nexus Cyber Espionage Group Targeting Governments in Asia and Europe
  • How Threat Intelligence and Multi-Source Data Drive Smarter Vulnerability Prioritization
  • What Defenders Need to Know about Iran’s Cyber Capabilities
  • National Cyber Resilience in the AI Era

Cloudflare

  • Slashing agent token costs by 98% with RFC 9457-compliant error responses
  • AI Security for Apps is now generally available
  • Investigating multi-vector attacks in Log Explorer
  • Building a security overview dashboard for actionable insights
  • Translating risk insights into actionable protection: leveling up security posture with Cloudflare and Mastercard
  • Fixing request smuggling vulnerabilities in Pingora OSS deployments
  • Active defense: introducing a stateful vulnerability scanner for APIs
  • Complexity is a choice. SASE migrations shouldn’t take years.
  • From the endpoint to the prompt: a unified data security vision in Cloudflare One
  • Ending the "silent drop": how Dynamic Path MTU Discovery makes the Cloudflare One Client more …

Google Online Security Blog

  • Cultivating a robust and efficient quantum-safe HTTPS
  • Staying One Step Ahead: Strengthening Android’s Lead in Scam Protection
  • Keeping Google Play & Android app ecosystems safe in 2025
  • New Android Theft Protection Feature Updates: Smarter, Stronger
  • HTTPS certificate industry phasing out less secure domain validation methods
  • Further Hardening Android GPUs
  • Architecting Security for Agentic Capabilities in Chrome
  • Android expands pilot for in-call scam protection for financial apps
  • Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
  • Rust in Android: move fast and fix things

Have I Been Owned

  • Provecho - 712,904 breached accounts
  • Lovora - 495,556 breached accounts
  • Quitbro - 22,874 breached accounts
  • KomikoAI - 1,060,191 breached accounts
  • Odido - 6,077,025 breached accounts
  • Canadian Tire - 38,306,562 breached accounts
  • CarGurus - 12,461,887 breached accounts
  • CarMax - 431,371 breached accounts
  • Figure - 967,178 breached accounts
  • Canada Goose - 581,877 breached accounts

Kaspersky

  • BeatBanker and BTMOB trojans: infection techniques and how to stay safe | Kaspersky official blog
  • Mental health apps are leaking your private thoughts. How do you protect yourself? | Kaspersky …
  • Ransomware attacks on schools and colleges | Kaspersky official blog
  • How to disable unwanted AI assistants and features on your PC and smartphone | Kaspersky …
  • What a browser-in-the-browser attack is, and how to spot a fake login window | Kaspersky …
  • AI assistant in Kaspersky Container Security
  • CVE-2026-3102: macOS ExifTool image-processing vulnerability | Kaspersky official blog
  • Local KTAE and the IDA Pro plugin | Kaspersky official blog
  • Variations of the ClickFix | Kaspersky official blog
  • Phishing via Google Tasks | Kaspersky official blog

Reddit: /r/netsec

  • /r/netsec's Q1 2026 Information Security Hiring Thread
  • r/netsec monthly discussion & tool thread
  • CFP: NaClCON 2026 – Conference on the History of Hacking (May 31 – June 2, …
  • CVE-2026-28292: RCE in simple-git via case-sensitivity bypass (CVSS 9.8)
  • How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit
  • CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover
  • Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix)
  • Classifying email providers of 2000+ Swiss municipalities via DNS, looking for feedback on methodology
  • Red-Run - Claude CTF Automation
  • Your Duolingo Is Still Talking to ByteDance: How Pangle Fingerprints You Across Apps After You …

Reddit: /r/pwned

  • Conduent data breach could be largest in U.S. history
  • How I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
  • DoorDash says personal information of customers, dashers stolen in data breach
  • July 2025 Hack Report: China, CRM Clouds, Ransomware—and Yes, "123456"
  • May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
  • Britain’s Companies Are Being Hacked
  • Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
  • Data breaches you might have missed this month
  • Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data …
  • Has TradingView ever experienced any data breaches?

Search Security

  • 5 steps to approach BYOD compliance policies
  • What is identity and access management? Guide to IAM
  • Cybersecurity awareness quiz: Questions and answers
  • What is data masking?
  • What is antivirus software?
  • Top 15 IT security frameworks and standards explained
  • What is a stealth virus and how does it work?
  • What is information security (infosec)?
  • What is Triple DES and why is it disallowed?
  • How to prevent DoS attacks and what to do if they happen

Shodan

  • 5 Free Things for Everybody
  • Deep Dive: Malware Hunter
  • Deep Dive: http.favicon
  • Changelog: www.shodan.io
  • Developer Access to Shodan Trends
  • Accepting Crypto: A Vendor Perspective
  • Historical IP Information
  • nrich: A Tool for Fast IP enrichment
  • Introducing Data Feeds for Search Results
  • Introducing the InternetDB API

Tenable

  • Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
  • LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities
  • President Trump's Cyber Strategy for America: What It Means for the U.S. and Why It …
  • Tenable Named a Challenger in the 2026 Gartner® Magic Quadrant™ for CPS Protection Platforms
  • Strengthening California’s Cyber Defenses: Apply Now for FFY 2024 SLCGP Grants
  • Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations
  • CVE-2026-20127: Cisco Catalyst SD-WAN Controller/Manager Zero-Day Authentication Bypass Vulnerability Exploited in the Wild
  • New Malicious npm Package "ambar-src" Targets Developers with Open Source Malware
  • Dynamic Objects in Active Directory: The Stealthy Threat
  • The Cloud and AI Velocity Trap: Why Governance Is Falling Behind Innovation

Threatpost

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Twitter Whistleblower Complaint: The TL;DR Version
  • Firewall Bug Under Active Attack Triggers CISA Warning
  • Fake Reservation Links Prey on Weary Travelers
  • iPhone Users Urged to Update to Patch 2 Zero-Days
  • Google Patches Chrome’s Fifth Zero-Day of the Year

Trusted Sec

  • Building a Detection Foundation: Part 3 - PowerShell and Script Logging
  • Building a Detection Foundation: Part 2 - Windows Security Events
  • Building a Detection Foundation: Part 1 - The Single-Source Problem
  • Notepad++ Plugins: Plug and Payload
  • Updated GSA Contractor CUI Protection Requirements
  • Securing Entra ID Administration: Tier 0
  • Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive
  • MCP in Burp Suite: From Enumeration to Targeted Exploitation
  • LDAP Channel Binding and LDAP Signing
  • Adventures in Primary Group Behavior, Reporting, and Exploitation

App Sec

Checkmarx

  • Kudos to the Unsung Heroes in our Current Times: Software Developers
  • Deliver Secure Software from Home: Checkmarx Offers Free 45-Day Codebashing Trial
  • Why “Shift Left” in DevOps is really “Shift Center”
  • Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
  • A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead
  • Discussing AppSec Policies within DevSecOps
  • RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle
  • Free your Developers from Mundane Tasks
  • Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
  • Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)

iSec Partners

  • Introducing opinel: Scout2's favorite tool
  • IAM user management strategy (part 2)
  • iSEC audit of MediaWiki
  • Work daily with enforced MFA-protected API access
  • Use and enforce Multi-Factor Authentication
  • iSEC reviews SecureDrop
  • Recognizing and Preventing TOCTOU Whitepaper
  • IAM user management strategy
  • Do not use your AWS root account
  • Announcing the AWS blog post series

NCC Group Crypto Services

  • Implementing Optimized Cryptography for Embedded Systems
  • Fast and Secure Implementations of the Falcon Post-Quantum Cryptography Signature Algorithm
  • The Longest Blockchain is not the Strongest Blockchain
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
  • Bitcoin Orphan Transactions and CVE-2012-3789
  • Undefined Behavior Is Really Undefined
  • Ethereum Top 10 Security Vulnerabilities For Smart Contracts
  • Confidential Transactions from Basic Principles
  • New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish)
  • What are State-sized adversaries doing to spy on us? Or how to backdoor Diffie-Hellman

Offensive Security

  • The AI Security Skills Gap: What It Is, Where It Exists, and How to Close …
  • Careers in Offensive AI Security: Roles, Skills, and Pathways
  • Building an AI-Ready Cybersecurity Team
  • The Skills That Will Matter for Offensive AI Security in 2026
  • Defending Against AI-Powered Cyber Attacks: Why Your Blue Team Needs New Skills
  • CVE-2026-24061 – GNU InetUtils telnetd Authentication Bypass Vulnerability
  • Thinking Like an Attacker: How Attackers Target AI Systems
  • Offensive Security in the Age of AI: Red Teaming LLM
  • How OffSec Maps Cybersecurity Training to Industry Frameworks
  • Closing Out 2025 with Gratitude (and Momentum)

The Hacker News

  • Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes
  • Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
  • Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
  • Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
  • What Boards Must Demand in the Age of AI-Automated Exploitation
  • Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
  • UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
  • Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
  • FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
  • How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Sysadmin

AWS Blog

  • AWS Weekly Roundup: Amazon Connect Health, Bedrock AgentCore Policy, GameDay Europe, and more (March 9, …
  • Introducing OpenClaw on Amazon Lightsail to run your autonomous private AI agents
  • AWS Weekly Roundup: OpenAI partnership, AWS Elemental Inference, Strands Labs, and more (March 2, 2026)
  • AWS Security Hub Extended offers full-stack enterprise security with curated partner solutions
  • Transform live video for mobile audiences with AWS Elemental Inference
  • AWS Weekly Roundup: Claude Sonnet 4.6 in Amazon Bedrock, Kiro in GovCloud Regions, new Agent …
  • Amazon EC2 Hpc8a Instances powered by 5th Gen AMD EPYC processors are now available
  • Announcing Amazon SageMaker Inference for custom Amazon Nova models
  • AWS Weekly Roundup: Amazon EC2 M8azn instances, new open weights models in Amazon Bedrock, and …
  • AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with …

Cyberciti

  • Download of the day: GIMP 3.0 is FINALLY Here!
  • Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems
  • ZFS Raidz Expansion Finally, Here in version 2.3.0
  • lnav – Awesome terminal log file viewer for Linux and Unix
  • sttr – Awesome Linux & Unix tool for transformation of the string
  • How to block AI Crawler Bots using robots.txt file
  • Debian Linux 12.1 released with Security Updates
  • Setting up VSCode for Ansible Lightspeed AI in Ubuntu 22.04 desktop
  • How to upgrade FreeBSD 13.1 to 13.2 release

Distro Watch

  • Distribution Release: LinuxHub Prime 2026.03.10
  • Distribution Release: Univention Corporate Server 5.2-5
  • Distribution Release: Zentyal Server 8.1
  • Development Release: Fedora 44 Beta
  • BSD Release: FreeBSD 14.4
  • DistroWatch Weekly, Issue 1163
  • Distribution Release: CachyOS 260308
  • Distribution Release: Zenclora OS 2.0
  • Mobile OS Release: iodéOS 7.3
  • Distribution Release: Linux From Scratch 13.0

Netflix Techblog

  • Scaling Global Storytelling: Modernizing Localization Analytics at Netflix
  • Optimizing Recommendation Systems with JDK’s Vector API
  • Mount Mayhem at Netflix: Scaling Containers on Modern CPUs
  • MediaFM: The Multimodal AI Foundation for Media Understanding at Netflix
  • Scaling LLM Post-Training at Netflix
  • Automating RDS Postgres to Aurora Postgres Migration
  • The AI Evolution of Graph Search at Netflix
  • How Temporal Powers Reliable Cloud Operations at Netflix
  • Netflix Live Origin
  • AV1 — Now Powering 30% of Netflix Streaming

Reddit: /r/linux

  • The EU is trying to implement a plan to use AI to scan and report …
  • EU is proposing a new mass surveillance law and they are asking the public for …
  • Linux Patches Make The IPv6 Stack Less Modular To Lower Architectural Burden
  • Follow-up to my bill text comparison: I traced who wrote the OS-level age verification template …
  • Tony Hoare, creator of Quicksort & Null, passed away.
  • OCCT v16.1 beta brings live overclocking / undervolting / optimizations to Arrow Lake Intel CPUs …
  • Your opinions on the Lutris AI Slop situation?
  • Google Trends: "how to install linux" is going... viral?!
  • Picked this up for fifty cents today while buying cheap encyclopedias for an art project.
  • KeePassXC 2.7.12 released

Reddit: /r/linuxadmin

  • FreeIPA account on SAN storage
  • Clone a LVM2-based disk (ssd) to a bigger disk
  • Open source SQL static analyzer, zero dependencies, works completely offline
  • Backup PostgreSQL with Veeam
  • Set home, bash
  • An idea that would shut the Linux restriction in its tracks
  • SOAR for Rapid7 SIEM
  • A Productivity-Focused AI Terminal Written in Rust (Tauri)
  • should i swap zram for my original swap.img file?
  • Linux 7.0 File-System Benchmarks With XFS Leading The Way

Reddit: /r/sysadmin

  • Remote work
  • Microsoft 365 Microsoft Authenticator App Only
  • How long does it take your team to deploy a new AWS VPC or Azure …
  • Possible XTIUM backend security incident; No customer notice yet?
  • A guide (linked below) absolutely messed up my RDP. I've undone what I changed but …
  • Cannot open file shared from a Microsoft Team Channel (folder within the team)
  • eDiscovery Content Search by Message ID in Purview (Non premium)
  • ScreenConnect Client connections from Linux OS - toolbar is tiny and hard to read
  • What is a good user to replacement end device ratio to maintain?
  • Sysadmins, what's your policy on employees using ChatGPT for work?

Reddit: /r/homelab

  • My s3-orchestrator project: configure x-number of s3-style backends and present a unified endpoint . Handles …
  • Impossible to run single CPU on dell R640?
  • Curious of a spped difference with a ssd
  • Why didn't I join sooner? Loving Homelab and the options a self-hosted server allows.
  • What tools you guys using for self-hosted AI automation?
  • Website redesign - Arr stack moved to VPS
  • IBM x3550 m5 19 inch
  • Need some advice on storage
  • Sanity check, feedback, and advice
  • Would appreciate help with HP MicroServer N40L!

Stack Exchange: Security

  • How can Microsoft Power Automate securely call an on-premises API without exposing it to the …
  • Safety of forward SMS OTP in Android via third party app
  • How can I make my own version of executable with specific code [closed]
  • How does running proprietary software affect system security? [duplicate]
  • Access token and userinfo caching in backend - security issue?
  • Running zap scan on a web application is not detecting all endpoints
  • Understanding Cross-Domain Cookies and `SameSite` Attributes with Express.js and Third-Party Tracking
  • Problem overiding the return address when performing a buffer overflow, what am I missing?
  • Does emulation/software virtualization provide more isolation/security vs hardware virtualization?
  • Why do most examples of CSRF use roundabout ways of executing an API call instead …

Tech News

Ars Technica

  • Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
  • Amazon appears to be down, with over 20,000 reported problems
  • Trump gets data center companies to pledge to pay for power generation
  • Downdetector, Speedtest sold to IT service-provider Accenture in $1.2B deal
  • LLMs can unmask pseudonymous users at scale with surprising accuracy
  • Google quantum-proofs HTTPS by squeezing 15kB of data into 700-byte space
  • New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
  • Password managers' promise that they can't see your vaults isn't always true
  • Most VMware users still "actively reducing their VMware footprint," survey finds
  • Retraction: After a routine code rejection, an AI agent published a hit piece on someone …

Tech Crunch

  • How I Get Free Traffic from ChatGPT in 2025 (AIO vs SEO)
  • Top 10 AI Tools That Will Transform Your Content Creation in 2025
  • LimeWire AI Studio Review 2023: Details, Pricing & Features
  • Top 10 AI Tools in 2023 That Will Make Your Life Easier
  • Top 10 AI Content Generator & Writer Tools in 2022
  • Beginner Guide to CJ Affiliate (Commission Junction) in 2022
  • TOP 11 AI MARKETING TOOLS YOU SHOULD USE (Updated 2022)
  • Most Frequently Asked Questions About Affiliate Marketing
  • What is Blockchain: Everything You Need to Know (2022)
  • ProWritingAid VS Grammarly: Which Grammar Checker is Better in (2022) ?

The Verge

  • Some of the best horror games ever made are included in Humble’s $15 bundle
  • Valve says it will fight New York’s loot box lawsuit
  • The Live Nation settlement has industry insiders baffled
  • Grammarly says it will stop using AI to clone experts without permission
  • Microsoft’s ‘Xbox mode’ is coming to every Windows 11 PC
  • Microsoft’s next Xbox, Project Helix, won’t reach alpha until 2027
  • OpenAI’s Sora video generator is reportedly coming to ChatGPT
  • Alternative app store AltStore PAL is joining the fediverse
  • Canva’s new editing tool adds layers to AI-generated designs
  • How to ditch Ring’s surveillance network
  • Back to top
  • RSS
  • GitHub