Denard.me
  • Blog
  • Dashboard
    • Dashboard
    • - Security Experts
    • - Security Operations
    • - Application Security
    • - Sysadmin
    • - Tech News
  • Services
  • Archives
  • Résumé
  • Contact

Security Experts

Anthony Ferrara

  • Wiring a Home Network
  • A PHP Compiler, aka The FFI Rabbit Hole
  • Protecting Against XSS In RAILS - JavaScript Contexts
  • Disclosure: WordPress WPDB SQL Injection - Technical
  • Disclosure: WordPress WPDB SQL Injection - Background
  • Ponderings on Odoriferous Syntactical Constructifications
  • Building an 8-bit Computer
  • Trust
  • All About Middleware
  • Simple, Easy, Risk and Change

Chris Hoff

  • On building fire extinguishers and fighting fires…
  • The 3 Immutable Rules Of Presentations…
  • Looking Forward to Catching Up At RSA…
  • Attribution is the new black…what’s in a name, anyway?
  • The Active Response Continuum & The Right To Cyber Self Defense…
  • Incomplete Thought: The Time Is Now For OCP-like White Box Security Appliances
  • J-Law Nudie Pics, Jeremiah, Privacy and Dropbox – An Epic FAIL of Mutual Distraction
  • How To Be a Cloud Mogul(l) – Our 2014 RSA “Dueling Banjos/Cloud/DevOps” Talk
  • On the Topic Of ‘Stopping’ DDoS.
  • The Easiest $20 I ever saved…

Dan Kaminsky: Blog

  • Hacking the Universe with Quantum Encraption
  • Read My Lips: Let’s Kill 0Day
  • The Cryptographically Provable Con Man
  • Validating Satoshi (Or Not)
  • “The Feds Have Let The Cyber World Burn. Let’s Put the Fires Out.”
  • I Might Be Afraid Of This Ghost
  • A Skeleton Key of Unknown Strength
  • Defcon 23: Let’s End Clickjacking
  • Safe Computing In An Unsafe World: Die Zeit Interview
  • Talking with Stewart Baker

Elliptic News

  • Celebrating 40 years of Elliptic Curves in Cryptography (ECC), August 11, 2025
  • 25th Workshop on Elliptic Curve Cryptography, Taipei, Taiwan, Oct 30 – Nov 1, 2024
  • New cryptanalysis of M-SIDH isogeny cryptography
  • SIAM Conference on Applied Algebraic Geometry (AG23)
  • Some comments on the CSIDH group action
  • Equivalence between CDH and DLP
  • EdDSA standardized
  • Attacks on SIDH/SIKE
  • Breaking supersingular isogeny Diffie-Hellman (SIDH)
  • Hertzbleed Attack

Fillipio

  • The 2025 Go Cryptography State of the Union
  • Claude Code Can Debug Low-level Cryptography
  • The Geomys Standard of Care
  • A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
  • Maintainers of Last Resort
  • Cross-Site Request Forgery
  • Go Assembly Mutation Testing
  • Encrypting Files with Passkeys and age
  • You Should Run a Certificate Transparency Log
  • Benchmarking RSA Key Generation

Graham Cluley

  • Gartner tells businesses to block AI browsers now
  • Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem
  • Ransomware may have extorted over $2.1 billion between 2022-2024, but it’s not all bad news, …
  • Four years later, Irish health service offers €750 to victims of ransomware attack
  • California man admits role in $263 million cryptocurrency theft that funded lavish lifestyle
  • The AI Fix #80: DeepSeek’s cheap GPT-5 rival, Antigravity fails, and your LLM likes it …
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • Why the record-breaking 30 Tbps DDoS attack should concern every business
  • Smashing Security podcast #446: A hacker doxxes himself, and social engineering-as-a-service
  • FBI warns of surge in account takeover (ATO) fraud schemes – what you need to …

Krebs on Security

  • Microsoft Patch Tuesday, December 2025 Edition
  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’
  • Is Your Android TV Streaming Box Part of a Botnet?
  • Mozilla Says It’s Finally Done With Two-Faced Onerep
  • The Cloudflare Outage May Be a Security Roadmap
  • Microsoft Patch Tuesday, November 2025 Edition
  • Google Sues to Disrupt Chinese SMS Phishing Triad
  • Drilling Down on Uncle Sam’s Proposed TP-Link Ban

Lenny Zeltser

  • How Security and Privacy Teams Break Barriers Together
  • The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership
  • What to Do With Products Without SSO?
  • Transform the Defender’s Dilemma into the Defender’s Advantage
  • Are CISOs of Security Vendors in Your Community?
  • How to Write Good Incident Response Reports
  • My Story So Far and Your Own Career Journey
  • 3 Opportunities for Cybersecurity Leaders Who Choose to Stay
  • Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
  • How Security Can Better Support Software Engineering Teams

The MPC Lounge

  • 5th Bar-Ilan Winter School 2015: Advances in Practical Multiparty Computation
  • Publicly Auditable Secure Multiparty Computation
  • Faster Maliciously Secure Two-Party Computation Using the GPU
  • Adapt, adapt, adapt
  • MiniTrix for MiniMacs
  • Categorizing MPC
  • Communication-Efficient MPC for General Adversary Structures
  • Fair enough
  • How to use bitcoin to design fair protocols
  • Round-efficient black-box constructions of composable multi-party computation

Root Labs rdist

  • Rebooting
  • In Which You Get a Chance to Save Democracy
  • Was the past better than now?
  • Thought experiment on protocols and noise
  • Timing-safe memcmp and API parity
  • In Defense of JavaScript Crypto

Russ McRee

  • Moving blog to HolisticInfoSec.io
  • toolsmith #133 - Anomaly Detection & Threat Hunting with Anomalize
  • toolsmith #132 - The HELK vs APTSimulator - Part 2
  • toolsmith #131 - The HELK vs APTSimulator - Part 1
  • toolsmith #130 - OSINT with Buscador
  • toolsmith #129 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 2
  • McRee added to ISSA's Honor Roll for Lifetime Achievement
  • toolsmith #128 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 1
  • Toolsmith Tidbit: Windows Auditing with WINspect
  • Toolsmith Release Advisory: Magic Unicorn v2.8

Schneier on Security

  • Friday Squid Blogging: Giant Squid Eating a Diamondback Squid
  • Building Trustworthy AI Agents
  • AIs Exploiting Smart Contracts
  • FBI Warns of Fake Video Scams
  • AI vs. Human Drivers
  • Substitution Cipher Based on The Voynich Manuscript
  • Friday Squid Blogging: Vampire Squid Genome
  • New Anonymous Phone Service
  • Like Social Media, AI Requires Difficult Choices
  • Banning VPNs

Shtetl-Optimized

  • Understanding vs. impact: the paradox of how to spend my time
  • Theory and AI Alignment
  • Mihai Pătrașcu Best Paper Award: Guest post from Seth Pettie
  • Podcasts!
  • Quantum Investment Bros: Have you no shame?
  • Quantum computing: too much to handle!
  • UT Austin’s Statement on Academic Integrity
  • On keeping a packed suitcase
  • An Experimental Program for AI-Powered Feedback at STOC: Guest Post from David Woodruff
  • My talk at Columbia University: “Computational Complexity and Explanations in Physics”

Troy Hunt

  • Processing 630 Million More Pwned Passwords, Courtesy of the FBI
  • Weekly Update 481
  • Why Does Have I Been Pwned Contain "Fake" Email Addresses?
  • Weekly Update 480
  • Weekly Update 479
  • Weekly Update 478
  • Weekly Update 477
  • 2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been …
  • Weekly Update 476
  • How We (Almost) Found Chromium's Bug via Crash Reports to Report URI

Xavier Mertens

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?
  • [SANS ISC] Quick Malware Triage With Inotify Tools
  • [SANS ISC] From a Zalando Phishing to a RAT
  • [SANS ISC] Show me All Your Windows!
  • [SANS ISC] Are Leaked Credentials Dumps Used by Attackers?
  • [SANS ISC] Do Attackers Pay More Attention to IPv6?

Sec Ops

Checkpoint

  • Check Point CloudGuard Network Security Advances Auto-Scaling Support for Oracle Cloud Workloads
  • Infinity Global Services’ Cyber Park World Championship Crowns Its First Global Winners
  • Global Cyber Attacks Increase in November 2025 Driven by Ransomware Surge and GenAI Risks
  • 40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed …
  • Cyber Threats to the U.S.: What Policymakers Need to Know for 2026
  • What is “React2Shell” (CVE-2025-55182) – in Plain English – and Why Check Point CloudGuard WAF …
  • The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back
  • Defend Against the Latest Cyber Threats with AI Security and Expanded Zero Trust for Hybrid …
  • Check Point Named a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security
  • AI Has Become the New Enterprise Perimeter — and Gemini 3 Pro Just Proved It

Cloudflare

  • React2Shell and related RSC vulnerabilities threat brief: early exploitation activity and threat actor techniques
  • Shifting left at enterprise scale: how we manage Cloudflare with Infrastructure as Code
  • Python Workers redux: fast cold starts, packages, and a uv-first workflow
  • Cloudflare outage on December 5, 2025
  • Cloudflare WAF proactively protects against React vulnerability
  • Cloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnets
  • Why Replicate is joining Cloudflare
  • Partnering with Black Forest Labs to bring FLUX.2 [dev] to Workers AI
  • Get better visibility for the WAF with payload logging
  • Cloudflare outage on November 18, 2025

Google Online Security Blog

  • HTTPS certificate industry phasing out less secure domain validation methods
  • Further Hardening Android GPUs
  • Architecting Security for Agentic Capabilities in Chrome
  • Android expands pilot for in-call scam protection for financial apps
  • Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
  • Rust in Android: move fast and fix things
  • How Android provides the most effective protection to keep you safe from mobile scams
  • HTTPS by default
  • Accelerating adoption of AI for cybersecurity at DEF CON 33
  • Supporting Rowhammer research to protect the DRAM ecosystem

Have I Been Owned

  • KinoKong - 817,808 breached accounts
  • Zilvia.net - 287,863 breached accounts
  • China Software Developer Network - 6,414,990 breached accounts
  • CodeStepByStep - 103,077 breached accounts
  • ADDA - 1,829,314 breached accounts
  • International Kiteboarding Organization - 340,349 breached accounts
  • Beckett Collectibles - 1,041,238 breached accounts
  • Eurofiber - 10,003 breached accounts
  • Vultr - 187,872 breached accounts
  • Operation Endgame 3.0 - 2,046,030 breached accounts

Kaspersky

  • Where does the data stolen in a phishing attack go? | Kaspersky official blog
  • Breach of 120 000 IP cameras in South Korea: security tips | Kaspersky official blog
  • A stealer hiding in Blender 3D models | Kaspersky official blog
  • The AMOS infostealer is piggybacking ChatGPT’s chat-sharing feature | Kaspersky official blog
  • CVE-2025-55182 vulnerability in React and Next.js | Kaspersky official blog
  • Protecting LLM chats from the eavesdropping Whisper Leak attack | Kaspersky official blog
  • How cheaters use rigged DeckMate 2 shuffling machines in poker games | Kaspersky official blog
  • Kaspersky Embedded Systems Security: what’s new?
  • How your dashcam can be hacked, and how to protect yourself from the attack | …
  • Microsoft Exchange on-premises hardening recommendations

Reddit: /r/netsec

  • /r/netsec's Q4 2025 Information Security Hiring Thread
  • r/netsec monthly discussion & tool thread
  • The FreePBX Rabbit Hole: CVE-2025-66039 & More
  • A modern tale of blinkenlights
  • How widespread is the impact of Critical Security Vulnerability in React Server Components(CVE-2025-55182)
  • SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies And WSDL - watchTowr Labs
  • Require Google to Remove One-Click Full Logout URLs
  • Covert red team phishing
  • Extending Burp Suite for fun and profit – The Montoya way – Part 9 - …
  • Free Honey Tokens for Breach Detection - No Signup

Reddit: /r/pwned

  • May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
  • Britain’s Companies Are Being Hacked
  • Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
  • Data breaches you might have missed this month
  • Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data …
  • Has TradingView ever experienced any data breaches?
  • 1 Million Accounts Impacted by the Massive 2023 Glamira Data Breach, 875,000 Emails Exposed
  • Anna Jaques Hospital ransomware breach exposed data of 300K patients
  • Hot Topic Breach Confirmed, Millions of Credit Cards Exposed
  • UnitedHealth breach leaks info on over 100M people. Including medical records.

Search Security

  • What is identity and access management? Guide to IAM
  • What is data masking?
  • Cybersecurity awareness quiz: Questions and answers
  • What is antivirus software?
  • Top 15 IT security frameworks and standards explained
  • What is a stealth virus and how does it work?
  • What is Triple DES and why is it disallowed?
  • What is information security (infosec)?
  • How to prevent DoS attacks and what to do if they happen
  • Credit Karma leader shares AI governance lessons learned

Shodan

  • 5 Free Things for Everybody
  • Deep Dive: Malware Hunter
  • Deep Dive: http.favicon
  • Changelog: www.shodan.io
  • Developer Access to Shodan Trends
  • Accepting Crypto: A Vendor Perspective
  • Historical IP Information
  • nrich: A Tool for Fast IP enrichment
  • Introducing Data Feeds for Search Results
  • Introducing the InternetDB API

Tenable

  • Cybersecurity Snapshot: OWASP Ranks Top Agentic AI App Risks, as CISA Lists Most Dangerous Software …
  • Tenable Partners with GSA OneGov To Help Federal Government Boost Its Cloud Security
  • Securing Federal Cloud Environments: Overcoming 5 Key Challenges with Tenable Cloud Security
  • Microsoft Copilot Studio Security Risk: How Simple Prompt Injection Leaked Credit Cards and Booked a …
  • Microsoft Patch Tuesday 2025 Year in Review
  • Preparing for Cisco Vulnerability Management (formerly Kenna) End-of-Life: How Tenable Can Help
  • Microsoft’s December 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-62221)
  • Identifying and Securing AI Workloads
  • Detecting AI Security Risks Requires Specialized Tools: Time to Move Beyond DLP and CASB
  • Cybersecurity Snapshot: Fending Off BRICKSTORM Malware Data-Theft Attacks and Integrating AI into OT Securely

Threatpost

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Twitter Whistleblower Complaint: The TL;DR Version
  • Firewall Bug Under Active Attack Triggers CISA Warning
  • Fake Reservation Links Prey on Weary Travelers
  • iPhone Users Urged to Update to Patch 2 Zero-Days
  • Google Patches Chrome’s Fifth Zero-Day of the Year

Trusted Sec

  • Holy Shuck! Weaponizing NTLM Hashes as a Wordlist
  • What is a TrustedSec Program Maturity Assessment (PMA)?
  • Helpful Hints for Writing (and Editing) Cybersecurity Reports
  • Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach
  • CMMC Subcontractors and Service Providers
  • Hack-cessibility: When DLL Hijacks Meet Windows Helpers
  • Detecting Password-Spraying in Entra ID Using a Honeypot Account
  • There's More than One Way to Trigger a Windows Service
  • Skimming Credentials with Azure's Front Door WAF
  • PCI P2PE vs. E2EE – Scoping it Out

App Sec

Checkmarx

  • Kudos to the Unsung Heroes in our Current Times: Software Developers
  • Deliver Secure Software from Home: Checkmarx Offers Free 45-Day Codebashing Trial
  • Why “Shift Left” in DevOps is really “Shift Center”
  • Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
  • A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead
  • Discussing AppSec Policies within DevSecOps
  • RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle
  • Free your Developers from Mundane Tasks
  • Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
  • Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)

iSec Partners

  • Introducing opinel: Scout2's favorite tool
  • IAM user management strategy (part 2)
  • iSEC audit of MediaWiki
  • Work daily with enforced MFA-protected API access
  • Use and enforce Multi-Factor Authentication
  • iSEC reviews SecureDrop
  • Recognizing and Preventing TOCTOU Whitepaper
  • IAM user management strategy
  • Do not use your AWS root account
  • Announcing the AWS blog post series

NCC Group Crypto Services

  • Implementing Optimized Cryptography for Embedded Systems
  • Fast and Secure Implementations of the Falcon Post-Quantum Cryptography Signature Algorithm
  • The Longest Blockchain is not the Strongest Blockchain
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
  • Bitcoin Orphan Transactions and CVE-2012-3789
  • Undefined Behavior Is Really Undefined
  • Ethereum Top 10 Security Vulnerabilities For Smart Contracts
  • Confidential Transactions from Basic Principles
  • New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish)
  • What are State-sized adversaries doing to spy on us? Or how to backdoor Diffie-Hellman

Offensive Security

  • How to Gain Experience in Cybersecurity
  • CVE-2025-55182 – React Server Components RCE via Flight Payload Deserialization
  • Why Enterprises Are Moving from Generic Cyber Training to Cyber Ranges
  • Unauthenticated Remote Code Execution Vulnerability in WSUS Service
  • Save 20% on OffSec’s Learn One!
  • From Failure to 100: How Akas Earned His OSCP+
  • OSCP vs. OSWE: Which Certification Fits Your Career Goals?
  • Recent Vulnerabilities in Redis Server’s Lua Scripting Engine
  • The Complete Guide to Preparing for Your First OffSec Certification
  • Red Teaming vs Pentesting: What’s the Difference?

The Hacker News

  • Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
  • Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
  • React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
  • ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
  • NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
  • The Impact of Robotic Process Automation (RPA) on Identity and Access Management
  • WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

Sysadmin

AWS Blog

  • AWS Weekly Roundup: AWS re:Invent keynote recap, on-demand videos, and more (December 8, 2025)
  • Amazon Bedrock adds reinforcement fine-tuning simplifying how developers build smarter, more accurate AI models
  • New serverless customization in Amazon SageMaker AI accelerates model fine-tuning
  • Introducing checkpointless and elastic training on Amazon SageMaker HyperPod
  • Announcing replication support and Intelligent-Tiering for Amazon S3 Tables
  • Amazon S3 Storage Lens adds performance metrics, support for billions of prefixes, and export to …
  • Amazon Bedrock AgentCore adds quality evaluations and policy controls for deploying trusted AI agents
  • Build multi-step applications and AI workflows with AWS Lambda durable functions
  • New capabilities to optimize costs and improve scalability on Amazon RDS for SQL Server and …
  • Introducing Database Savings Plans for AWS Databases

Cyberciti

  • Download of the day: GIMP 3.0 is FINALLY Here!
  • Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems
  • ZFS Raidz Expansion Finally, Here in version 2.3.0
  • lnav – Awesome terminal log file viewer for Linux and Unix
  • sttr – Awesome Linux & Unix tool for transformation of the string
  • How to block AI Crawler Bots using robots.txt file
  • Debian Linux 12.1 released with Security Updates
  • Setting up VSCode for Ansible Lightspeed AI in Ubuntu 22.04 desktop
  • How to upgrade FreeBSD 13.1 to 13.2 release

Distro Watch

  • Development Release: MX Linux 25 Beta 1
  • DistroWatch Weekly, Issue 1140
  • Distribution Release: DietPi 9.17
  • Development Release: Zorin OS 18 Beta
  • Distribution Release: IPFire 2.29 Core 197
  • Development Release: Ubuntu 25.10 Beta
  • Development Release: Linux Mint 7 Beta "LMDE"
  • Distribution Release: Tails 7.0
  • Distribution Release: Security Onion 2.4.180
  • Distribution Release: Omarchy 3.0.1

Netflix Techblog

  • AV1 — Now Powering 30% of Netflix Streaming
  • Supercharging the ML and AI Development Experience at Netflix
  • Post-Training Generative Recommenders with Advantage-Weighted Supervised Finetuning
  • Behind the Streams: Real-Time Recommendations for Live Events Part 3
  • How and Why Netflix Built a Real-Time Distributed Graph: Part 1 — Ingesting and Processing …
  • 100X Faster: How We Supercharged Netflix Maestro’s Workflow Engine
  • Building a Resilient Data Platform with Write-Ahead Log at Netflix
  • Scaling Muse: How Netflix Powers Data-Driven Creative Insights at Trillion-Row Scale
  • Empowering Netflix Engineers with Incident Management
  • From Facts & Metrics to Media Machine Learning: Evolving the Data Engineering Function at Netflix

Reddit: /r/linux

  • The EU is trying to implement a plan to use AI to scan and report …
  • EU is proposing a new mass surveillance law and they are asking the public for …
  • The most powerful supercomputer ever built and operated by Microsoft runs on Ubuntu
  • Using “AI” to manage your Fedora system seems like a really bad idea
  • Where does a Linux Live USB actually run? (Unplugged USB, OS kept working)
  • Gogs (self-hosted Git service written in Go) Zero-Day RCE (CVE-2025-8110) Actively Exploited
  • "Compact" Linux book from 2002
  • Unlock a memory: your first public Pull Request
  • Affinity for Linux? Canva's next big move could reshape the desktop software market
  • Why is the sensor support so poor compared to Windows (HWiNFO) and how do we …

Reddit: /r/linuxadmin

  • help with rsyslog forwarding
  • Career counseling
  • Need help with reverse proxy chain + tailscale
  • postfix current available options
  • Greg Kroah-Hartman wrote: Linux CVEs, more than you ever wanted to know
  • Passless — a Virtual FIDO2 / Passkey device and client for Linux
  • Impact of AI on Linux Kernel Development, discussion topic at Maintainers Summit 2025
  • Advice on structuring patch orchestration roles/playbooks
  • Hardening admin workstations against shell/PATH command hijacking (ssh wrapper via function/alias/PATH)
  • Certificate Ripper v2.6.0 released - tool to extract server certificates

Reddit: /r/sysadmin

  • Weird one...Windows File Browsing for random VPN users breaks and only File Server VM reboot …
  • Dear Microsoft
  • Dell Poweredge T320 IDRAC Update
  • Windows Server 2022 underclocking issue
  • KB5065426 - Windows 11 net use issues
  • Has anyone gone on an overseas travel for a year and half ?
  • Lenovo E15 Gen 3 - Recurring crashes
  • Faxing in 2025?
  • Help configuring Cisco switch port
  • threatview.io is down?

Reddit: /r/homelab

  • Critique my build for Unraid NAS server
  • Need Help with Dell PowerEdge Raid Card holding onto HW raid config in IT mode
  • Where to find left, 270 degree, PCI riser cables?!
  • Update: Built that homelab dashboard I was talking about
  • Rebranding a r630
  • Valid sim card to send sms via modem? US
  • 4 x 4TB HDD in RAID0 with another 16TB HDD as a backup of the …
  • Secure SSH access for AI agents via MCP. Execute commands across your server fleet with …
  • Worth investing 4 bay NAS?
  • The new monster-server

Stack Exchange: Security

  • Stalker used 30 different untradable numbers to send me texts [closed]
  • SERVER-WEBAPP ACME mini_httpd Arbitrary File Read
  • Changes in Firefox Credential Storage version 146.0+
  • Genymotion with burpsuite proxy setup failed
  • Kernel panic during ROP chain: GDB stepping mismatch and unexpected register state
  • Excel's Protected View protecting files with no macros? [closed]
  • how make custom.chr in john the ripper [closed]
  • Is juice jacking still a feasible threat that can easily succeed?
  • qbittorrent, did my IP leak? [closed]
  • Plausibility of a write-only hack of an employee database [closed]

Tech News

Ars Technica

  • OpenAI built an AI coding agent and uses it to improve the agent itself
  • OpenAI releases GPT-5.2 after “code red” Google threat alert
  • Disney invests $1 billion in OpenAI, licenses 200 characters for AI video app Sora
  • Oracle shares slide on $15B increase in data center spending
  • A new open-weights AI coding model is closing in on proprietary options
  • Operation Bluebird wants to relaunch “Twitter,” says Musk abandoned the name and logo
  • Meta offers EU users ad-light option in push to end investigation
  • In comedy of errors, men accused of wiping gov databases turned to an AI tool
  • Admins and defenders gird themselves against maximum-severity server vuln
  • Microsoft drops AI sales targets in half after salespeople miss their quotas

Tech Crunch

  • What is Blockchain: Everything You Need to Know (2025)
  • Top 10 AI Tools That Will Transform Your Content Creation in 2025
  • LimeWire AI Studio Review 2023: Details, Pricing & Features
  • Top 10 AI Tools in 2023 That Will Make Your Life Easier
  • Top 10 AI Content Generator & Writer Tools in 2022
  • Beginner Guide to CJ Affiliate (Commission Junction) in 2022
  • TOP 11 AI MARKETING TOOLS YOU SHOULD USE (Updated 2022)
  • Most Frequently Asked Questions About Affiliate Marketing
  • What is Blockchain: Everything You Need to Know (2022)
  • ProWritingAid VS Grammarly: Which Grammar Checker is Better in (2022) ?

The Verge

  • The Verge’s 2025 holiday gift guide
  • The best instant cameras you can buy right now
  • Parents call for New York governor to sign landmark AI safety bill
  • The Verge’s favorite holiday gifts under $100
  • The long shot
  • Some of our favorite gifts will cost you less than $25
  • 33 practical smart home gifts that make everyday life a little easier
  • We found 70 stocking stuffers under $100 that are actually useful
  • iOS 26.2 is here with Liquid Glass, AirDrop, and Apple Music updates
  • Mmm, Qi donuts
  • Back to top
  • RSS
  • GitHub