Denard.me
  • Blog
  • Dashboard
    • Dashboard
    • - Security Experts
    • - Security Operations
    • - Application Security
    • - Sysadmin
    • - Tech News
  • Services
  • Archives
  • Résumé
  • Contact

Security Experts

Anthony Ferrara

  • Wiring a Home Network
  • A PHP Compiler, aka The FFI Rabbit Hole
  • Protecting Against XSS In RAILS - JavaScript Contexts
  • Disclosure: WordPress WPDB SQL Injection - Technical
  • Disclosure: WordPress WPDB SQL Injection - Background
  • Ponderings on Odoriferous Syntactical Constructifications
  • Building an 8-bit Computer
  • Trust
  • All About Middleware
  • Simple, Easy, Risk and Change

Chris Hoff

  • On building fire extinguishers and fighting fires…
  • The 3 Immutable Rules Of Presentations…
  • Looking Forward to Catching Up At RSA…
  • Attribution is the new black…what’s in a name, anyway?
  • The Active Response Continuum & The Right To Cyber Self Defense…
  • Incomplete Thought: The Time Is Now For OCP-like White Box Security Appliances
  • J-Law Nudie Pics, Jeremiah, Privacy and Dropbox – An Epic FAIL of Mutual Distraction
  • How To Be a Cloud Mogul(l) – Our 2014 RSA “Dueling Banjos/Cloud/DevOps” Talk
  • On the Topic Of ‘Stopping’ DDoS.
  • The Easiest $20 I ever saved…

Dan Kaminsky: Blog

  • Hacking the Universe with Quantum Encraption
  • Read My Lips: Let’s Kill 0Day
  • The Cryptographically Provable Con Man
  • Validating Satoshi (Or Not)
  • “The Feds Have Let The Cyber World Burn. Let’s Put the Fires Out.”
  • I Might Be Afraid Of This Ghost
  • A Skeleton Key of Unknown Strength
  • Defcon 23: Let’s End Clickjacking
  • Safe Computing In An Unsafe World: Die Zeit Interview
  • Talking with Stewart Baker

Elliptic News

  • Celebrating 40 years of Elliptic Curves in Cryptography (ECC), August 11, 2025
  • 25th Workshop on Elliptic Curve Cryptography, Taipei, Taiwan, Oct 30 – Nov 1, 2024
  • New cryptanalysis of M-SIDH isogeny cryptography
  • SIAM Conference on Applied Algebraic Geometry (AG23)
  • Some comments on the CSIDH group action
  • Equivalence between CDH and DLP
  • EdDSA standardized
  • Attacks on SIDH/SIKE
  • Breaking supersingular isogeny Diffie-Hellman (SIDH)
  • Hertzbleed Attack

Fillipio

  • The 2025 Go Cryptography State of the Union
  • Claude Code Can Debug Low-level Cryptography
  • The Geomys Standard of Care
  • A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
  • Maintainers of Last Resort
  • Cross-Site Request Forgery
  • Go Assembly Mutation Testing
  • Encrypting Files with Passkeys and age
  • You Should Run a Certificate Transparency Log
  • Benchmarking RSA Key Generation

Graham Cluley

  • UK’s new cybersecurity bill takes aim at ransomware gangs and state-backed hackers
  • Wind farm worker sentenced after turning turbines into a secret crypto mine
  • Smashing Security podcast #444: We’re sorry. Wait, did a company actually say that?
  • The AI Fix #77: Genome LLM makes a super-virus, and should AI decide if you …
  • A miracle: A company says sorry after a cyber attack – and donates the ransom …
  • Smashing Security podcast #443: Tinder’s camera roll and the Buffett deepfake
  • Leading AI companies accidentally leak their passwords and digital keys on GitHub – what you …
  • Russian hacker admits helping Yanluowang ransomware infect companies
  • The AI Fix #76: AI self-awareness, and the death of comedy
  • Hack halts Dutch broadcaster, forcing radio hosts back to LPs

Krebs on Security

  • Mozilla Says It’s Finally Done With Two-Faced Onerep
  • The Cloudflare Outage May Be a Security Roadmap
  • Microsoft Patch Tuesday, November 2025 Edition
  • Google Sues to Disrupt Chinese SMS Phishing Triad
  • Drilling Down on Uncle Sam’s Proposed TP-Link Ban
  • Cloudflare Scrubs Aisuru Botnet from Top Domains List
  • Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody
  • Aisuru Botnet Shifts from DDoS to Residential Proxies
  • Canada Fines Cybercrime Friendly Cryptomus $176M
  • Email Bombs Exploit Lax Authentication in Zendesk

Lenny Zeltser

  • How Security and Privacy Teams Break Barriers Together
  • The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership
  • What to Do With Products Without SSO?
  • Transform the Defender’s Dilemma into the Defender’s Advantage
  • Are CISOs of Security Vendors in Your Community?
  • How to Write Good Incident Response Reports
  • My Story So Far and Your Own Career Journey
  • 3 Opportunities for Cybersecurity Leaders Who Choose to Stay
  • Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
  • How Security Can Better Support Software Engineering Teams

The MPC Lounge

  • 5th Bar-Ilan Winter School 2015: Advances in Practical Multiparty Computation
  • Publicly Auditable Secure Multiparty Computation
  • Faster Maliciously Secure Two-Party Computation Using the GPU
  • Adapt, adapt, adapt
  • MiniTrix for MiniMacs
  • Categorizing MPC
  • Communication-Efficient MPC for General Adversary Structures
  • Fair enough
  • How to use bitcoin to design fair protocols
  • Round-efficient black-box constructions of composable multi-party computation

Root Labs rdist

  • Rebooting
  • In Which You Get a Chance to Save Democracy
  • Was the past better than now?
  • Thought experiment on protocols and noise
  • Timing-safe memcmp and API parity
  • In Defense of JavaScript Crypto

Russ McRee

  • Moving blog to HolisticInfoSec.io
  • toolsmith #133 - Anomaly Detection & Threat Hunting with Anomalize
  • toolsmith #132 - The HELK vs APTSimulator - Part 2
  • toolsmith #131 - The HELK vs APTSimulator - Part 1
  • toolsmith #130 - OSINT with Buscador
  • toolsmith #129 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 2
  • McRee added to ISSA's Honor Roll for Lifetime Achievement
  • toolsmith #128 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 1
  • Toolsmith Tidbit: Windows Auditing with WINspect
  • Toolsmith Release Advisory: Magic Unicorn v2.8

Schneier on Security

  • Friday Squid Blogging: New “Squid” Sneaker
  • More on Rewiring Democracy
  • AI as Cyberattacker
  • Scam USPS and E-Z Pass Texts and Websites
  • Legal Restrictions on Vulnerability Disclosure
  • AI and Voter Engagement
  • More Prompt||GTFO
  • Friday Squid Blogging: Pilot Whales Eat a Lot of Squid
  • Upcoming Speaking Engagements
  • The Role of Humans in an AI-Powered World

Shtetl-Optimized

  • Podcasts!
  • Quantum Investment Bros: Have you no shame?
  • Quantum computing: too much to handle!
  • UT Austin’s Statement on Academic Integrity
  • On keeping a packed suitcase
  • An Experimental Program for AI-Powered Feedback at STOC: Guest Post from David Woodruff
  • My talk at Columbia University: “Computational Complexity and Explanations in Physics”
  • Sad and happy day
  • The QMA Singularity
  • HSBC unleashes yet another “qombie”: a zombie claim of quantum advantage that isn’t

Troy Hunt

  • Weekly Update 479
  • Weekly Update 478
  • Weekly Update 477
  • 2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been …
  • Weekly Update 476
  • How We (Almost) Found Chromium's Bug via Crash Reports to Report URI
  • Weekly Update 475
  • Inside the Synthient Threat Data
  • Weekly Update 474
  • Weekly Update 473

Xavier Mertens

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?
  • [SANS ISC] Quick Malware Triage With Inotify Tools
  • [SANS ISC] From a Zalando Phishing to a RAT
  • [SANS ISC] Show me All Your Windows!
  • [SANS ISC] Are Leaked Credentials Dumps Used by Attackers?
  • [SANS ISC] Do Attackers Pay More Attention to IPv6?

Sec Ops

Checkpoint

  • Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the …
  • Cyber Insurance Won’t Save You from Bad Hygiene
  • The Black Friday Cyber Crime Economy: Surge in Fraudulent Domains and eCommerce Scams
  • Check Point Launches Managed Rules for AWS Network Firewall
  • Best-in-Class GenAI Security: When CloudGuard WAF Meets Lakera
  • How CIOs Can Turn AI Visibility into Strategy
  • The State of Ransomware in Q3 2025
  • Payroll Pirates: One Network, Hundreds of Targets
  • Global Cyber Attacks Surge in October 2025 Amid Explosive Ransomware Growth and Rising GenAI Threats
  • New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond

Cloudflare

  • Cloudflare outage on November 18, 2025
  • Replicate is joining Cloudflare
  • Finding the grain of sand in a heap of Salt
  • Connecting to production: the architecture of remote bindings
  • A closer look at Python Workflows, now in beta
  • DIY BYOIP: a new way to Bring Your Own IP prefixes to Cloudflare
  • Async QUIC and HTTP/3 made easy: tokio-quiche is now open-source
  • Extract audio from your videos with Cloudflare Stream
  • How Workers VPC Services connects to your regional private networks from anywhere in the world
  • Building a better testing experience for Workflows, our durable execution engine for multi-step applications

Google Online Security Blog

  • Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
  • Rust in Android: move fast and fix things
  • How Android provides the most effective protection to keep you safe from mobile scams
  • HTTPS by default
  • Accelerating adoption of AI for cybersecurity at DEF CON 33
  • Supporting Rowhammer research to protect the DRAM ecosystem
  • How Pixel and Android are bringing a new level of trust to your images with …
  • Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification
  • Introducing OSS Rebuild: Open Source, Rebuilt to Last
  • Advancing Protection in Chrome on Android

Have I Been Owned

  • CodeStepByStep - 17,351 breached accounts
  • ADDA - 1,829,314 breached accounts
  • International Kiteboarding Organization - 340,349 breached accounts
  • Beckett Collectibles - 541,132 breached accounts
  • Eurofiber - 10,003 breached accounts
  • Vultr - 187,872 breached accounts
  • Operation Endgame 3.0 - 2,046,030 breached accounts
  • TISZA Világ - 198,520 breached accounts
  • Synthient Credential Stuffing Threat Data - 1,957,476,021 breached accounts
  • MyVidster (2025) - 3,864,364 breached accounts

Kaspersky

  • Syncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
  • Hacking Black Friday: using LLMs to save on the “sale of the year” | Kaspersky …
  • How to securely vet browser extensions across your organization
  • How a fake AI sidebar can steal your data | Kaspersky official blog
  • CVE-2024-12649: vulnerability in the Canon TTF interpreter
  • What is the Pixnapping vulnerability, and how to protect your Android smartphone? | Kaspersky official …
  • What is FileFix — a ClickFix variation? | Kaspersky official blog
  • How scammers use email for blackmail and extortion | Kaspersky official blog
  • How enterprise efficiency grows with Kaspersky SD-WAN
  • Half of the world's satellite traffic is unencrypted | Kaspersky official blog

Reddit: /r/netsec

  • r/netsec monthly discussion & tool thread
  • /r/netsec's Q4 2025 Information Security Hiring Thread
  • Esbuild XSS Bug That Survived 5B Downloads and Bypassed HTML Sanitization
  • When Updates Backfire: RCE in Windows Update Health Tools
  • Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757)
  • Exploiting A Pre-Auth RCE in W3 Total Cache For WordPress (CVE-2025-9501)
  • RCE via a malicious SVG in mPDF
  • HelixGuard uncovers malicious "spellchecker" packages on PyPI using multi-layer encryption to steal crypto wallets.
  • LITE XL RCE (CVE-2025-12121)
  • ShadowRay 2.0: Active Global Campaign Hijacks Ray AI Infrastructure Into Self-Propagating Botnet | Oligo Security

Reddit: /r/pwned

  • May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
  • Britain’s Companies Are Being Hacked
  • Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
  • Data breaches you might have missed this month
  • Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data …
  • Has TradingView ever experienced any data breaches?
  • 1 Million Accounts Impacted by the Massive 2023 Glamira Data Breach, 875,000 Emails Exposed
  • Anna Jaques Hospital ransomware breach exposed data of 300K patients
  • Hot Topic Breach Confirmed, Millions of Credit Cards Exposed
  • UnitedHealth breach leaks info on over 100M people. Including medical records.

Search Security

  • What is identity and access management? Guide to IAM
  • What is data masking?
  • Cybersecurity awareness quiz: Questions and answers
  • What is antivirus software?
  • Top 15 IT security frameworks and standards explained
  • What is a stealth virus and how does it work?
  • What is information security (infosec)?
  • What is Triple DES and why is it disallowed?
  • How to prevent DoS attacks and what to do if they happen
  • Credit Karma leader shares AI governance lessons learned

Shodan

  • 5 Free Things for Everybody
  • Deep Dive: Malware Hunter
  • Deep Dive: http.favicon
  • Changelog: www.shodan.io
  • Developer Access to Shodan Trends
  • Accepting Crypto: A Vendor Perspective
  • Historical IP Information
  • nrich: A Tool for Fast IP enrichment
  • Introducing Data Feeds for Search Results
  • Introducing the InternetDB API

Tenable

  • Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
  • Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the …
  • Stop Patching Panic: Ditch Slow Manual Patching and Embrace Intelligent Automation
  • Active Directory Trust Misclassification: Why Old Trusts Look Like Insecure External Trusts
  • Tenable Cloud Vulnerability Management: Reducing Vulnerability Risk in the Cloud Era
  • CVE-2025-64446: Fortinet FortiWeb Zero-Day Path Traversal Vulnerability Exploited in the Wild
  • Cybersecurity Snapshot: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec …
  • How Rapid AI Adoption Is Creating an Exposure Gap
  • Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215)
  • Tenable Is a Leader in the First-Ever Gartner® Magic Quadrant™ for Exposure Assessment Platforms

Threatpost

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Twitter Whistleblower Complaint: The TL;DR Version
  • Firewall Bug Under Active Attack Triggers CISA Warning
  • Fake Reservation Links Prey on Weary Travelers
  • iPhone Users Urged to Update to Patch 2 Zero-Days
  • Google Patches Chrome’s Fifth Zero-Day of the Year

Trusted Sec

  • Helpful Hints for Writing (and Editing) Cybersecurity Reports
  • Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach
  • CMMC Subcontractors and Service Providers
  • Hack-cessibility: When DLL Hijacks Meet Windows Helpers
  • Detecting Password-Spraying in Entra ID Using a Honeypot Account
  • There's More than One Way to Trigger a Windows Service
  • Skimming Credentials with Azure's Front Door WAF
  • PCI P2PE vs. E2EE – Scoping it Out
  • HIPAA Applicability - Understanding the Security, Breach Notification, and Privacy Rules
  • HIPAA Business Associates - What’s Your Function?

App Sec

Checkmarx

  • Kudos to the Unsung Heroes in our Current Times: Software Developers
  • Deliver Secure Software from Home: Checkmarx Offers Free 45-Day Codebashing Trial
  • Why “Shift Left” in DevOps is really “Shift Center”
  • Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
  • A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead
  • Discussing AppSec Policies within DevSecOps
  • RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle
  • Free your Developers from Mundane Tasks
  • Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
  • Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)

iSec Partners

  • Introducing opinel: Scout2's favorite tool
  • IAM user management strategy (part 2)
  • iSEC audit of MediaWiki
  • Work daily with enforced MFA-protected API access
  • Use and enforce Multi-Factor Authentication
  • iSEC reviews SecureDrop
  • Recognizing and Preventing TOCTOU Whitepaper
  • IAM user management strategy
  • Do not use your AWS root account
  • Announcing the AWS blog post series

NCC Group Crypto Services

  • Implementing Optimized Cryptography for Embedded Systems
  • Fast and Secure Implementations of the Falcon Post-Quantum Cryptography Signature Algorithm
  • The Longest Blockchain is not the Strongest Blockchain
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
  • Bitcoin Orphan Transactions and CVE-2012-3789
  • Undefined Behavior Is Really Undefined
  • Ethereum Top 10 Security Vulnerabilities For Smart Contracts
  • Confidential Transactions from Basic Principles
  • New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish)
  • What are State-sized adversaries doing to spy on us? Or how to backdoor Diffie-Hellman

Offensive Security

  • Why Enterprises Are Moving from Generic Cyber Training to Cyber Ranges
  • Unauthenticated Remote Code Execution Vulnerability in WSUS Service
  • Save 20% on OffSec’s Learn One!
  • From Failure to 100: How Akas Earned His OSCP+
  • OSCP vs. OSWE: Which Certification Fits Your Career Goals?
  • Recent Vulnerabilities in Redis Server’s Lua Scripting Engine
  • The Complete Guide to Preparing for Your First OffSec Certification
  • Red Teaming vs Pentesting: What’s the Difference?
  • How to Prevent Prompt Injection
  • What Is Ethical Hacking?

The Hacker News

  • China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
  • Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
  • CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
  • Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
  • Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
  • Why IT Admins Choose Samsung for Mobile Security
  • APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
  • SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
  • Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Sysadmin

AWS Blog

  • New one-click onboarding and notebooks with a built-in AI agent in Amazon SageMaker Unified Studio
  • Build production-ready applications without infrastructure complexity using Amazon ECS Express Mode
  • Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
  • Introducing attribute-based access control for Amazon S3 general purpose buckets
  • Simplify access to external services using AWS IAM Outbound Identity Federation
  • Accelerate workflow development with enhanced local testing in AWS Step Functions
  • Streamlined multi-tenant application development with tenant isolation mode in AWS Lambda
  • New business metadata features in Amazon SageMaker Catalog to improve discoverability across organizations
  • AWS Control Tower introduces a Controls Dedicated experience
  • New: AWS Billing Transfer for centrally managing AWS billing and costs across multiple organizations

Cyberciti

  • Download of the day: GIMP 3.0 is FINALLY Here!
  • Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems
  • ZFS Raidz Expansion Finally, Here in version 2.3.0
  • lnav – Awesome terminal log file viewer for Linux and Unix
  • sttr – Awesome Linux & Unix tool for transformation of the string
  • How to block AI Crawler Bots using robots.txt file
  • Debian Linux 12.1 released with Security Updates
  • Setting up VSCode for Ansible Lightspeed AI in Ubuntu 22.04 desktop
  • How to upgrade FreeBSD 13.1 to 13.2 release

Distro Watch

  • Development Release: MX Linux 25 Beta 1
  • DistroWatch Weekly, Issue 1140
  • Distribution Release: DietPi 9.17
  • Development Release: Zorin OS 18 Beta
  • Distribution Release: IPFire 2.29 Core 197
  • Development Release: Ubuntu 25.10 Beta
  • Development Release: Linux Mint 7 Beta "LMDE"
  • Distribution Release: Tails 7.0
  • Distribution Release: Security Onion 2.4.180
  • Distribution Release: Omarchy 3.0.1

Netflix Techblog

  • Supercharging the ML and AI Development Experience at Netflix
  • Post-Training Generative Recommenders with Advantage-Weighted Supervised Finetuning
  • Behind the Streams: Real-Time Recommendations for Live Events Part 3
  • How and Why Netflix Built a Real-Time Distributed Graph: Part 1 — Ingesting and Processing …
  • 100X Faster: How We Supercharged Netflix Maestro’s Workflow Engine
  • Building a Resilient Data Platform with Write-Ahead Log at Netflix
  • Scaling Muse: How Netflix Powers Data-Driven Creative Insights at Trillion-Row Scale
  • Empowering Netflix Engineers with Incident Management
  • From Facts & Metrics to Media Machine Learning: Evolving the Data Engineering Function at Netflix
  • ML Observability: Bringing Transparency to Payments and Beyond

Reddit: /r/linux

  • The EU is trying to implement a plan to use AI to scan and report …
  • EU is proposing a new mass surveillance law and they are asking the public for …
  • Firefox now supports the Freedesktop.org XDG Base Directory Specification.
  • Linus Torvalds thinks that the AI Boom was the main reason for Nvidia to improve …
  • After 17 years, Firefox will finally support XDG Dir spec!?
  • 5 pioneering Linux distros that quietly faded into history
  • Dell Now Shipping Laptop With Qualcomm NPU On Linux Ahead Of Windows 11
  • NetBSD 11.0 release is immitent! Help test the future of portability.
  • Linux 6.18 Sees Late Improvements For Xbox Ally, Lenovo Legion Go, & Alienware Laptops
  • Learning Linux is the only mid-life crisis I can afford.

Reddit: /r/linuxadmin

  • Seeking advice on landing the first job in IT
  • Why "top" missed the cron job that was killing our API latency
  • Why doesn't FIO return anything, and are there alternative tools?
  • PPP-over-HTTP/2: Having Fun with dumbproxy and pppd
  • Apt-mirror - size difference - why?
  • Pacemaker/DRBD: Auto-failback kills active DRBD Sync Primary to Secondary. How to prevent this?
  • syslog_ng issues with syslog facility "overflowing" to user facility?
  • How to securely auto-decrypt LUKS on boot up
  • New version of socktop released.
  • Startech RKCONS1908K password reset

Reddit: /r/sysadmin

  • Advice on MDM solutions for our business setup
  • 🎙️ Anyone here using meeting notetaker tool? ($50 chat invite)
  • Browser extensions are becoming a huge security headache
  • Are printers just always broken?
  • Switch phone android to android. Can i transfer my existing workaccounts on microsoft authenticator to …
  • user not getting registered for device
  • Weekly 'I made a useful thing' Thread - November 21, 2025
  • Google buys Wiz for $32B… what’s the backup plan now in a worst-case scenario?
  • Adobe Collab Sync chrash
  • Chronosphere goes to Palo Alto

Reddit: /r/homelab

  • Help me buy NAS server tomorrow
  • [don] - tiroirs disque dur 2,5
  • My Home Lab setup and what to do next with blackfriday??
  • Monitoring Dashboard
  • Voixo - extension to transform and translate Youtube voice with AI (speech to speech)
  • Lenovo ThinkServer RD330 won’t boot with any GPU — is external graphics impossible on this …
  • How it started / How it's going
  • I want to build my first DIY homelab and don't know where to begin
  • NAS RAID 5 "JBOD" Until Drive Upgrade
  • Hello, could I get some advice regarding setting up a new NAS?

Stack Exchange: Security

  • Why do money transactions stop during the change of clock due to daylight saving time? …
  • using ffuf with wordfile but it is not finding .env [closed]
  • File backup encryption for personal files
  • Can you bypass PIN requirement of FIDO token protected LUKS device with hex editor?
  • What is the difference between contactless Apple Pay and contactless card?
  • Does qualified electronic signature require a certified middleware
  • Managing keys for encrypted system backups and recovery
  • Can /proc/PID/fd be used to snoop on anonymous sockets?
  • Testing for Broken Object Level Authorization (BOLA) vulnerabilities
  • Decrypt SSL with Wireshark supported browsers

Tech News

Ars Technica

  • Oops. Cryptographers cancel election results after losing decryption key.
  • How to know if your Asus router is one of thousands hacked by China-state hackers
  • Google tells employees it must double capacity every 6 months to meet AI demand
  • HP and Dell disable HEVC support built into their laptops’ CPUs
  • Massive Cloudflare outage was triggered by file that suddenly doubled in size
  • Critics scoff after Microsoft warns AI feature can infect machines and pilfer data
  • Tech giants pour billions into Anthropic as circular AI investments roll on
  • Bonkers Bitcoin heist: 5-star hotels, cash-filled envelopes, vanishing funds
  • Google CEO: If an AI bubble pops, no one is getting out clean
  • 5 plead guilty to laptop farm and ID theft scheme to land North Koreans US …

Tech Crunch

  • Top 10 AI Tools That Will Transform Your Content Creation in 2025
  • LimeWire AI Studio Review 2023: Details, Pricing & Features
  • Top 10 AI Tools in 2023 That Will Make Your Life Easier
  • Top 10 AI Content Generator & Writer Tools in 2022
  • Beginner Guide to CJ Affiliate (Commission Junction) in 2022
  • TOP 11 AI MARKETING TOOLS YOU SHOULD USE (Updated 2022)
  • Most Frequently Asked Questions About Affiliate Marketing
  • What is Blockchain: Everything You Need to Know (2022)
  • ProWritingAid VS Grammarly: Which Grammar Checker is Better in (2022) ?
  • Sellfy Review 2022: How Good Is This Ecommerce Platform?

The Verge

  • DOGE is no more, and in its wake, only chaos
  • About This Account reveals the scale of X’s foreign troll problem
  • Some of the best Nintendo Switch games are up to $30 off for Black Friday
  • X’s messy About This Account rollout has caused utter chaos
  • Sony’s last-gen XM4 headphones are over 50 percent off for Black Friday
  • Vine walked so TikTok could run
  • Apple TV wants to go big
  • The app that will instantly improve your Windows PC
  • Shocker: Elon Musk spends a lot of time on X posting bad political takes
  • Sony’s entire DualSense lineup is $20 off, including the limited edition models
  • Back to top
  • RSS
  • GitHub