Denard.me
  • Blog
  • Dashboard
    • Dashboard
    • - Security Experts
    • - Security Operations
    • - Application Security
    • - Sysadmin
    • - Tech News
  • Services
  • Archives
  • Résumé
  • Contact

Security Experts

Anthony Ferrara

  • Wiring a Home Network
  • A PHP Compiler, aka The FFI Rabbit Hole
  • Protecting Against XSS In RAILS - JavaScript Contexts
  • Disclosure: WordPress WPDB SQL Injection - Technical
  • Disclosure: WordPress WPDB SQL Injection - Background
  • Ponderings on Odoriferous Syntactical Constructifications
  • Building an 8-bit Computer
  • Trust
  • All About Middleware
  • Simple, Easy, Risk and Change

Chris Hoff

  • On building fire extinguishers and fighting fires…
  • The 3 Immutable Rules Of Presentations…
  • Looking Forward to Catching Up At RSA…
  • Attribution is the new black…what’s in a name, anyway?
  • The Active Response Continuum & The Right To Cyber Self Defense…
  • Incomplete Thought: The Time Is Now For OCP-like White Box Security Appliances
  • J-Law Nudie Pics, Jeremiah, Privacy and Dropbox – An Epic FAIL of Mutual Distraction
  • How To Be a Cloud Mogul(l) – Our 2014 RSA “Dueling Banjos/Cloud/DevOps” Talk
  • On the Topic Of ‘Stopping’ DDoS.
  • The Easiest $20 I ever saved…

Dan Kaminsky: Blog

  • Psychologists Say Greeting Unfamiliar Dogs Can Reveal Specific Personality Traits
  • Psychologists Identify Three Color Preferences Linked to Fragile Self-Confidence
  • Psychology Says Preferring Solitude Over Constant Socializing Reflects These 8 Personality Traits
  • Psychology Explains What It Means to Walk Slowly With Your Hands Behind Your Back
  • Psychology Says People Who Push Their Chair In After Leaving a Table Share These 9 …
  • Psychology Says People Who Neatly Fold Grocery Bags Share These 7 Personality Traits
  • Psychology Says Letting Others Go First When They’re Rushed Reflects These 6 Awareness Traits
  • Psychology Says People Who Are Consistently On Time Share These 7 Integrity Traits
  • Psychology Says Talking to Yourself When You’re Alone Isn’t a Bad Habit—It Often Reveals Powerful …
  • Behavioral Scientists Say People Who Walk Faster Than Average Share Consistent Personality Traits

Elliptic News

  • Celebrating 40 years of Elliptic Curves in Cryptography (ECC), August 11, 2025
  • 25th Workshop on Elliptic Curve Cryptography, Taipei, Taiwan, Oct 30 – Nov 1, 2024
  • New cryptanalysis of M-SIDH isogeny cryptography
  • SIAM Conference on Applied Algebraic Geometry (AG23)
  • Some comments on the CSIDH group action
  • Equivalence between CDH and DLP
  • EdDSA standardized
  • Attacks on SIDH/SIKE
  • Breaking supersingular isogeny Diffie-Hellman (SIDH)
  • Hertzbleed Attack

Fillipio

  • go.sum Is Not a Lockfile
  • Building a Transparent Keyserver
  • The 2025 Go Cryptography State of the Union
  • Claude Code Can Debug Low-level Cryptography
  • The Geomys Standard of Care
  • A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
  • Maintainers of Last Resort
  • Cross-Site Request Forgery
  • Go Assembly Mutation Testing
  • Encrypting Files with Passkeys and age

Graham Cluley

  • WEF: AI overtakes ransomware as fastest-growing cyber risk
  • Smashing Security podcast #450: From Instagram panic to Grok gone wild
  • The AI Fix #83: ChatGPT Health, Victorian LLMs, and the biggest AI bluffers
  • Hackers get hacked, as BreachForums database is leaked
  • pcTattletale founder pleads guilty in rare stalkerware prosecution
  • Smashing Security podcast #449: How to scam someone in seven days
  • Coinbase insider who sold customer data to criminals arrested in India
  • The AI Fix #82: Santa Claus doesn’t exist (according to AI)
  • Smashing Security podcast #448: The Kindle that got pwned
  • Surveillance at sea: Cruise firm bans smart glasses to curb covert recording

Krebs on Security

  • Patch Tuesday, January 2026 Edition
  • Who Benefited from the Aisuru and Kimwolf Botnets?
  • The Kimwolf Botnet is Stalking Your Local Network
  • Happy 16th Birthday, KrebsOnSecurity.com!
  • Dismantling Defenses: Trump 2.0 Cyber Year in Review
  • Most Parked Domains Now Serving Malicious Content
  • Microsoft Patch Tuesday, December 2025 Edition
  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’

Lenny Zeltser

  • How Security and Privacy Teams Break Barriers Together
  • The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership
  • What to Do With Products Without SSO?
  • Transform the Defender’s Dilemma into the Defender’s Advantage
  • Are CISOs of Security Vendors in Your Community?
  • How to Write Good Incident Response Reports
  • My Story So Far and Your Own Career Journey
  • 3 Opportunities for Cybersecurity Leaders Who Choose to Stay
  • Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
  • How Security Can Better Support Software Engineering Teams

The MPC Lounge

  • 5th Bar-Ilan Winter School 2015: Advances in Practical Multiparty Computation
  • Publicly Auditable Secure Multiparty Computation
  • Faster Maliciously Secure Two-Party Computation Using the GPU
  • Adapt, adapt, adapt
  • MiniTrix for MiniMacs
  • Categorizing MPC
  • Communication-Efficient MPC for General Adversary Structures
  • Fair enough
  • How to use bitcoin to design fair protocols
  • Round-efficient black-box constructions of composable multi-party computation

Root Labs rdist

  • Rebooting
  • In Which You Get a Chance to Save Democracy
  • Was the past better than now?
  • Thought experiment on protocols and noise
  • Timing-safe memcmp and API parity
  • In Defense of JavaScript Crypto

Russ McRee

  • Moving blog to HolisticInfoSec.io
  • toolsmith #133 - Anomaly Detection & Threat Hunting with Anomalize
  • toolsmith #132 - The HELK vs APTSimulator - Part 2
  • toolsmith #131 - The HELK vs APTSimulator - Part 1
  • toolsmith #130 - OSINT with Buscador
  • toolsmith #129 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 2
  • McRee added to ISSA's Honor Roll for Lifetime Achievement
  • toolsmith #128 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 1
  • Toolsmith Tidbit: Windows Auditing with WINspect
  • Toolsmith Release Advisory: Magic Unicorn v2.8

Schneier on Security

  • New Vulnerability in n8n
  • Hacking Wheelchairs over Bluetooth
  • Upcoming Speaking Engagements
  • 1980s Hacker Manifesto
  • Corrupting LLMs Through Weird Generalizations
  • Friday Squid Blogging: The Chinese Squid-Fishing Fleet off the Argentine Coast
  • Palo Alto Crosswalk Signals Had Default Passwords
  • AI & Humans: Making the Relationship Work
  • The Wegman’s Supermarket Chain Is Probably Using Facial Recognition
  • A Cyberattack Was Part of the US Assault on Venezuela

Shtetl-Optimized

  • FREEDOM (while hoping my friends stay safe)
  • The Goodness Cluster
  • Venezuela through the lens of good and evil
  • My Christmas gift: telling you about PurpleMind, which brings CS theory to the YouTube masses
  • More on whether useful quantum computing is “imminent”
  • Happy Chanukah
  • Understanding vs. impact: the paradox of how to spend my time
  • Theory and AI Alignment
  • Mihai Pătrașcu Best Paper Award: Guest post from Seth Pettie
  • Podcasts!

Troy Hunt

  • Who Decides Who Doesn’t Deserve Privacy?
  • Weekly Update 485
  • Weekly Update 484
  • Weekly Update 483
  • Weekly Update 482
  • Processing 630 Million More Pwned Passwords, Courtesy of the FBI
  • Weekly Update 481
  • Why Does Have I Been Pwned Contain "Fake" Email Addresses?
  • Weekly Update 480
  • Weekly Update 479

Xavier Mertens

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?
  • [SANS ISC] Quick Malware Triage With Inotify Tools
  • [SANS ISC] From a Zalando Phishing to a RAT
  • [SANS ISC] Show me All Your Windows!
  • [SANS ISC] Are Leaked Credentials Dumps Used by Attackers?
  • [SANS ISC] Do Attackers Pay More Attention to IPv6?

Sec Ops

Checkpoint

  • Microsoft Remains the Most Imitated Brand in Phishing Attacks in Q4 2025
  • Patch Now: Active Exploitation Underway for Critical HPE OneView Vulnerability
  • Latin America Sees Sharpest Rise in Cyber Attacks in December 2025 as Ransomware Activity Accelerates
  • VoidLink: The Cloud-Native Malware Framework Weaponizing Linux Infrastructure
  • Opening the Automation Garden: API Request & Webhook Trigger in Infinity Playblocks
  • The Truman Show Scam: Trapped in an AI-Generated Reality
  • Check Point Supports Google Cloud Network Security Integration
  • Check Point Secures AI Factories with NVIDIA
  • Cyber Resilience Starts with Training: Why Skills Define Security Success
  • Check Point Celebrates 2025 with Top Analyst and Research Lab Recognitions

Cloudflare

  • Human Native is joining Cloudflare
  • What came first: the CNAME or the A record?
  • What we know about Iran’s Internet shutdown
  • A closer look at a BGP anomaly in Venezuela
  • How Workers powers our internal maintenance scheduling pipeline
  • Code Orange: Fail Small — our resilience plan following recent incidents
  • Innovating to address streaming abuse — and our latest transparency report
  • Announcing support for GROUP BY, SUM, and other aggregation queries in R2 SQL
  • The 2025 Cloudflare Radar Year in Review: The rise of AI, post-quantum, and record-breaking DDoS …
  • ChatGPT's rivals, Kwai's quiet rise: the top Internet services of 2025

Google Online Security Blog

  • HTTPS certificate industry phasing out less secure domain validation methods
  • Further Hardening Android GPUs
  • Architecting Security for Agentic Capabilities in Chrome
  • Android expands pilot for in-call scam protection for financial apps
  • Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
  • Rust in Android: move fast and fix things
  • How Android provides the most effective protection to keep you safe from mobile scams
  • HTTPS by default
  • Accelerating adoption of AI for cybersecurity at DEF CON 33
  • Supporting Rowhammer research to protect the DRAM ecosystem

Have I Been Owned

  • Instagram - 6,215,150 breached accounts
  • BreachForums (2025) - 672,247 breached accounts
  • WhiteDate - 6,076 breached accounts
  • WIRED - 2,364,431 breached accounts
  • Utair - 401,400 breached accounts
  • Медицинская лаборатория Гемотест (Gemotest) - 6,341,495 breached accounts
  • AUTOSUR - 487,226 breached accounts
  • The Botting Network - 96,320 breached accounts
  • Web Hosting Talk - 515,149 breached accounts
  • KinoKong - 817,808 breached accounts

Kaspersky

  • AI-powered sextortion: a new threat to privacy | Kaspersky official blog
  • How we set the standard for transparency and trust | Kaspersky official blog
  • Direct and reverse NFC relay attacks being used to steal money | Kaspersky official blog
  • Activity-masking infostealer dropper | Kaspersky official blog
  • New cybersecurity laws and trends in 2026 | Kaspersky official blog
  • The Stealka stealer hijacks accounts and steals crypto while masquerading as pirated software | Kaspersky …
  • ForumTroll targets political scientists | Kaspersky official blog
  • Phishing in Telegram Mini Apps: how to avoid taking the bait | Kaspersky official blog
  • How to discover and secure ownerless corporate IT assets
  • Where does the data stolen in a phishing attack go? | Kaspersky official blog

Reddit: /r/netsec

  • /r/netsec's Q4 2025 Information Security Hiring Thread
  • r/netsec monthly discussion & tool thread
  • Reprompt: The Single-Click Microsoft Copilot Attack that Silently Steals Your Personal Data
  • Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation
  • CVE-2026-20965: Cymulate Research Labs Discovers Token Validation Flaw that Leads to Tenant-Wide RCE in Azure …
  • Demonstration: prompt-injection failures in a simulated help-desk LLM
  • Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC
  • Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover
  • I'm The Captain Now: Hijacking a global ocean supply chain network
  • Bad Vibes: Comparing the Secure Coding Capabilities of Popular Coding Agents

Reddit: /r/pwned

  • How I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
  • DoorDash says personal information of customers, dashers stolen in data breach
  • July 2025 Hack Report: China, CRM Clouds, Ransomware—and Yes, "123456"
  • May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
  • Britain’s Companies Are Being Hacked
  • Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
  • Data breaches you might have missed this month
  • Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data …
  • Has TradingView ever experienced any data breaches?
  • 1 Million Accounts Impacted by the Massive 2023 Glamira Data Breach, 875,000 Emails Exposed

Search Security

  • What is identity and access management? Guide to IAM
  • What is data masking?
  • Cybersecurity awareness quiz: Questions and answers
  • What is antivirus software?
  • Top 15 IT security frameworks and standards explained
  • What is a stealth virus and how does it work?
  • What is Triple DES and why is it disallowed?
  • What is information security (infosec)?
  • How to prevent DoS attacks and what to do if they happen
  • Credit Karma leader shares AI governance lessons learned

Shodan

  • 5 Free Things for Everybody
  • Deep Dive: Malware Hunter
  • Deep Dive: http.favicon
  • Changelog: www.shodan.io
  • Developer Access to Shodan Trends
  • Accepting Crypto: A Vendor Perspective
  • Historical IP Information
  • nrich: A Tool for Fast IP enrichment
  • Introducing Data Feeds for Search Results
  • Introducing the InternetDB API

Tenable

  • CVE-2025-64155: Exploit Code Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
  • Microsoft’s January 2026 Patch Tuesday Addresses 113 CVEs (CVE-2026-20805)
  • Tenable Is a Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
  • Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine …
  • CVE-2025-14847 (MongoBleed): MongoDB Memory Leak Vulnerability Exploited in the Wild
  • Cybersecurity Snapshot: 2025 Rewind: Essential Cyber Insights, Strategies and Tactics
  • The 3% Rule: How To Silence 97% of Your Cloud Alerts and Be More Secure
  • Cybersecurity Snapshot: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, …
  • CVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Exploited
  • Complying with the Monetary Authority of Singapore’s Cloud Advisory: How Tenable Can Help

Threatpost

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Twitter Whistleblower Complaint: The TL;DR Version
  • Firewall Bug Under Active Attack Triggers CISA Warning
  • Fake Reservation Links Prey on Weary Travelers
  • iPhone Users Urged to Update to Patch 2 Zero-Days
  • Google Patches Chrome’s Fifth Zero-Day of the Year

Trusted Sec

  • CMMC Scope – Understanding the Sprawl
  • Updating the Sysmon Community Guide: Lessons Learned from the Front Lines
  • Limiting Domain Controller Attack Surface: Why Less Services, Less Software, Less Agents = Less Exposure
  • Top 10 Blogs of 2025
  • Holy Shuck! Weaponizing NTLM Hashes as a Wordlist
  • What is a TrustedSec Program Maturity Assessment (PMA)?
  • Helpful Hints for Writing (and Editing) Cybersecurity Reports
  • Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach
  • CMMC Subcontractors and Service Providers
  • Hack-cessibility: When DLL Hijacks Meet Windows Helpers

App Sec

Checkmarx

  • Kudos to the Unsung Heroes in our Current Times: Software Developers
  • Deliver Secure Software from Home: Checkmarx Offers Free 45-Day Codebashing Trial
  • Why “Shift Left” in DevOps is really “Shift Center”
  • Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
  • A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead
  • Discussing AppSec Policies within DevSecOps
  • RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle
  • Free your Developers from Mundane Tasks
  • Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
  • Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)

iSec Partners

  • Introducing opinel: Scout2's favorite tool
  • IAM user management strategy (part 2)
  • iSEC audit of MediaWiki
  • Work daily with enforced MFA-protected API access
  • Use and enforce Multi-Factor Authentication
  • iSEC reviews SecureDrop
  • Recognizing and Preventing TOCTOU Whitepaper
  • IAM user management strategy
  • Do not use your AWS root account
  • Announcing the AWS blog post series

NCC Group Crypto Services

  • Implementing Optimized Cryptography for Embedded Systems
  • Fast and Secure Implementations of the Falcon Post-Quantum Cryptography Signature Algorithm
  • The Longest Blockchain is not the Strongest Blockchain
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
  • Bitcoin Orphan Transactions and CVE-2012-3789
  • Undefined Behavior Is Really Undefined
  • Ethereum Top 10 Security Vulnerabilities For Smart Contracts
  • Confidential Transactions from Basic Principles
  • New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish)
  • What are State-sized adversaries doing to spy on us? Or how to backdoor Diffie-Hellman

Offensive Security

  • Thinking Like an Attacker: How Attackers Target AI Systems
  • Offensive Security in the Age of AI: Red Teaming LLM
  • How OffSec Maps Cybersecurity Training to Industry Frameworks
  • Closing Out 2025 with Gratitude (and Momentum)
  • 6 Benefits of a Fully Certified Cybersecurity Team
  • Blue Team vs Red Team: Should Defenders Learn Offensive Skills?
  • How Will AI Affect Cybersecurity?
  • How to Gain Experience in Cybersecurity
  • CVE-2025-55182 – React Server Components RCE via Flight Payload Deserialization
  • Why Enterprises Are Moving from Generic Cyber Training to Cyber Ranges

The Hacker News

  • Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
  • Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot
  • ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
  • 4 Outdated Habits Destroying Your SOC's MTTR in 2026
  • Microsoft Legal Action Disrupts RedVDS Cybercrime Infrastructure Used for Online Fraud
  • Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login
  • Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
  • AI Agents Are Becoming Authorization Bypass Paths
  • Hackers Exploit c-ares DLL Side-Loading to Bypass Security and Deploy Malware

Sysadmin

AWS Blog

  • Opening the AWS European Sovereign Cloud
  • AWS Weekly Roundup: AWS Lambda for .NET 10, AWS Client VPN quickstart, Best of AWS …
  • Happy New Year! AWS Weekly Roundup: 10,000 AIdeas Competition, Amazon EC2, Amazon ECS Managed Instances …
  • AWS Weekly Roundup: Amazon ECS, Amazon CloudWatch, Amazon Cognito and more (December 15, 2025)
  • AWS Weekly Roundup: AWS re:Invent keynote recap, on-demand videos, and more (December 8, 2025)
  • Amazon Bedrock adds reinforcement fine-tuning simplifying how developers build smarter, more accurate AI models
  • New serverless customization in Amazon SageMaker AI accelerates model fine-tuning
  • Introducing checkpointless and elastic training on Amazon SageMaker HyperPod
  • Announcing replication support and Intelligent-Tiering for Amazon S3 Tables
  • Amazon S3 Storage Lens adds performance metrics, support for billions of prefixes, and export to …

Cyberciti

  • Download of the day: GIMP 3.0 is FINALLY Here!
  • Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems
  • ZFS Raidz Expansion Finally, Here in version 2.3.0
  • lnav – Awesome terminal log file viewer for Linux and Unix
  • sttr – Awesome Linux & Unix tool for transformation of the string
  • How to block AI Crawler Bots using robots.txt file
  • Debian Linux 12.1 released with Security Updates
  • Setting up VSCode for Ansible Lightspeed AI in Ubuntu 22.04 desktop
  • How to upgrade FreeBSD 13.1 to 13.2 release

Distro Watch

  • Development Release: MX Linux 25 Beta 1
  • DistroWatch Weekly, Issue 1140
  • Distribution Release: DietPi 9.17
  • Development Release: Zorin OS 18 Beta
  • Distribution Release: IPFire 2.29 Core 197
  • Development Release: Ubuntu 25.10 Beta
  • Development Release: Linux Mint 7 Beta "LMDE"
  • Distribution Release: Tails 7.0
  • Distribution Release: Security Onion 2.4.180
  • Distribution Release: Omarchy 3.0.1

Netflix Techblog

  • How Temporal Powers Reliable Cloud Operations at Netflix
  • Netflix Live Origin
  • AV1 — Now Powering 30% of Netflix Streaming
  • Supercharging the ML and AI Development Experience at Netflix
  • Post-Training Generative Recommenders with Advantage-Weighted Supervised Finetuning
  • Behind the Streams: Real-Time Recommendations for Live Events Part 3
  • How and Why Netflix Built a Real-Time Distributed Graph: Part 1 — Ingesting and Processing …
  • 100X Faster: How We Supercharged Netflix Maestro’s Workflow Engine
  • Building a Resilient Data Platform with Write-Ahead Log at Netflix
  • Scaling Muse: How Netflix Powers Data-Driven Creative Insights at Trillion-Row Scale

Reddit: /r/linux

  • The EU is trying to implement a plan to use AI to scan and report …
  • EU is proposing a new mass surveillance law and they are asking the public for …
  • Opera GX announces linux support
  • Should basic features like 'Startup Apps' finally graduate from GNOME Tweaks to main Settings?
  • Kdenlive 25.12.1 released
  • GNOME Mutter 50 Alpha Released With X11 Backend Removed
  • Dylan Araps (Neofetch, KISS Linux) has updated his blog and github after years of silence.
  • GRUB 2.14 released
  • Linux on Surface Pro 5
  • How to easily install and run a full Debian system on the OpenWrt One

Reddit: /r/linuxadmin

  • Secure Boot: UEFI keys (KEK/DB) must be updated before June, even on older hardware
  • systemd user-space daemon capabilities problems
  • For apps that don’t auto save, how does it work behind the scenes for something …
  • Linux Isn't Just Free Software — It's Quiet Rebellion
  • Kubernetes is Linux
  • Learning Linux Seriously as a Data / Automation Person — Advice Needed
  • Are journalctl -p 4 and journalctl -p 0..4 the same?
  • I am fresher looking for Linux and Cloud job opportunities
  • XMRIG suddenly running on my VPSS?
  • Seeking referrals for entry-level Infrastructure / support roles

Reddit: /r/sysadmin

  • Rackspace 400% per user hosting increase
  • Internet Traffic: Local Firewall to Azure VM
  • Unattended Windows 24H2 install with WSIM always getting stuck on region, keyboard and privacy settings …
  • Cloud Hosted Call Center Phone System Recommendations.
  • Trouble running .exe from Powershell/CMD - No GUI shown
  • Egnyte as a Replacement for SMB + VPN?
  • Why are there no useful Windows-native networking tools??
  • Universal Labelsoftware
  • I just inherited a messy IT Environment, what do I do?
  • Can you add keywords to make finding objects in 365 easier?

Reddit: /r/homelab

  • Proxmox and truenas backup suggestions
  • Tool I built for debugging Home Assistant webhooks and Proxmox alerts in my homelab
  • I need help with instally drivers for TESLA P4
  • Firmware standalone (FAT) Huawei AP6150DN – apparato EoL
  • Help with music stack
  • a beginner´s setup
  • Rack mounted speaker?
  • Stress testing my new K3S management plane
  • Inspect and Debug local services behind Caddy: demo in docker-compose (from github)
  • Create your Talos Linux cluster in Hetzner with KSail

Stack Exchange: Security

  • Which of these four mechanisms can explain two different binaries with different SHA-256 hashes both …
  • What are the real security benefits of running an OS from a hardware-isolated USB device …
  • How can I securely store and manage API keys in a multi-environment web application?
  • Is there a way to deactivate ikvm on Asus kgpe-d16?
  • MongoBleed - Isn't it a vulnerability in zlib rather than MongoDB?
  • How to identify a RAT on macOS (gathering immediate information and reducing risk after noticing …
  • Receiving bank payments directly using curl into a business account without payment ui [closed]
  • What makes Certificate-Based Authentication phishing resistant?
  • DKIM key continuity log?
  • Modsecurity parse nested keys in json

Tech News

Ars Technica

  • Wikipedia signs AI training deals with Microsoft, Meta, and Amazon
  • A single click mounted a covert, multistage attack against Copilot
  • Bandcamp bans purely AI-generated music from its platform
  • The RAM shortage’s silver lining: Less talk about “AI PCs”
  • Never-before-seen Linux malware is “far more advanced than typical”
  • Hegseth wants to integrate Musk’s Grok AI into military networks this month
  • Microsoft vows to cover full power costs for energy-hungry AI data centers
  • Google removes some AI health summaries after investigation finds “dangerous” flaws
  • ChatGPT Health lets you connect medical records to an AI that makes things up
  • ChatGPT falls to new data-pilfering attack as a vicious cycle in AI continues

Tech Crunch

  • How I Get Free Traffic from ChatGPT in 2025 (AIO vs SEO)
  • Top 10 AI Tools That Will Transform Your Content Creation in 2025
  • LimeWire AI Studio Review 2023: Details, Pricing & Features
  • Top 10 AI Tools in 2023 That Will Make Your Life Easier
  • Top 10 AI Content Generator & Writer Tools in 2022
  • Beginner Guide to CJ Affiliate (Commission Junction) in 2022
  • TOP 11 AI MARKETING TOOLS YOU SHOULD USE (Updated 2022)
  • Most Frequently Asked Questions About Affiliate Marketing
  • What is Blockchain: Everything You Need to Know (2022)
  • ProWritingAid VS Grammarly: Which Grammar Checker is Better in (2022) ?

The Verge

  • Apple lost the AI race — now the real challenge starts
  • Democrats push FTC to investigate Trump Mobile
  • Here are the best AirPods deals you can get right now
  • Amazon is buying copper harvested by bacteria for its data centers
  • Pijama wants to bring more indie films to a global audience
  • An OpenAI safety research lead departed for Anthropic
  • I’ve tested the latest Switch 2 controllers, and this one is the best
  • Raspberry Pi’s new add-on board has 8GB of RAM for running gen AI models
  • Amazon is turning Fallout’s postapocalypse into a reality show
  • Microsoft is closing its employee library and cutting back on subscriptions
  • Back to top
  • RSS
  • GitHub