Denard.me
  • Blog
  • Dashboard
    • Dashboard
    • - Security Experts
    • - Security Operations
    • - Application Security
    • - Sysadmin
    • - Tech News
  • Services
  • Archives
  • Résumé
  • Contact

Security Experts

Anthony Ferrara

  • Wiring a Home Network
  • A PHP Compiler, aka The FFI Rabbit Hole
  • Protecting Against XSS In RAILS - JavaScript Contexts
  • Disclosure: WordPress WPDB SQL Injection - Technical
  • Disclosure: WordPress WPDB SQL Injection - Background
  • Ponderings on Odoriferous Syntactical Constructifications
  • Building an 8-bit Computer
  • Trust
  • All About Middleware
  • Simple, Easy, Risk and Change

Chris Hoff

  • On building fire extinguishers and fighting fires…
  • The 3 Immutable Rules Of Presentations…
  • Looking Forward to Catching Up At RSA…
  • Attribution is the new black…what’s in a name, anyway?
  • The Active Response Continuum & The Right To Cyber Self Defense…
  • Incomplete Thought: The Time Is Now For OCP-like White Box Security Appliances
  • J-Law Nudie Pics, Jeremiah, Privacy and Dropbox – An Epic FAIL of Mutual Distraction
  • How To Be a Cloud Mogul(l) – Our 2014 RSA “Dueling Banjos/Cloud/DevOps” Talk
  • On the Topic Of ‘Stopping’ DDoS.
  • The Easiest $20 I ever saved…

Dan Kaminsky: Blog

  • Hacking the Universe with Quantum Encraption
  • Read My Lips: Let’s Kill 0Day
  • The Cryptographically Provable Con Man
  • Validating Satoshi (Or Not)
  • “The Feds Have Let The Cyber World Burn. Let’s Put the Fires Out.”
  • I Might Be Afraid Of This Ghost
  • A Skeleton Key of Unknown Strength
  • Defcon 23: Let’s End Clickjacking
  • Safe Computing In An Unsafe World: Die Zeit Interview
  • Talking with Stewart Baker

Elliptic News

  • Celebrating 40 years of Elliptic Curves in Cryptography (ECC), August 11, 2025
  • 25th Workshop on Elliptic Curve Cryptography, Taipei, Taiwan, Oct 30 – Nov 1, 2024
  • New cryptanalysis of M-SIDH isogeny cryptography
  • SIAM Conference on Applied Algebraic Geometry (AG23)
  • Some comments on the CSIDH group action
  • Equivalence between CDH and DLP
  • EdDSA standardized
  • Attacks on SIDH/SIKE
  • Breaking supersingular isogeny Diffie-Hellman (SIDH)
  • Hertzbleed Attack

Fillipio

  • A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
  • Maintainers of Last Resort
  • Cross-Site Request Forgery
  • Go Assembly Mutation Testing
  • Encrypting Files with Passkeys and age
  • You Should Run a Certificate Transparency Log
  • Benchmarking RSA Key Generation
  • frood, an Alpine initramfs NAS
  • Accumulated Test Vectors
  • The FIPS Compliance of HKDF

Graham Cluley

  • BreachForums seized, but hackers say they will still leak Salesforce data
  • Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience
  • Salesforce data breach: what you need to know
  • The AI Fix #71: Hacked robots and power-hungry AI
  • Discord users’ data stolen by hackers in third-party data breach
  • Japan running dry: Ransomware attack leaves nation days away from Asahi beer shortage
  • Smashing Security podcast #437: Salesforce’s trusted domain of doom
  • Your favourite phone apps might be leaking your company’s secrets
  • From fake lovers to sextortionists: 260 scammers arrested across Africa
  • The AI Fix #70: AI behaves… until it knows you’re watching

Krebs on Security

  • DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
  • ShinyHunters Wage Broad Corporate Extortion Spree
  • Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms
  • Self-Replicating Worm Hits 180+ Software Packages
  • Bulletproof Host Stark Industries Evades EU Sanctions
  • Microsoft Patch Tuesday, September 2025 Edition
  • 18 Popular Code Packages Hacked, Rigged to Steal Crypto
  • GOP Cries Censorship Over Spam Filters That Work
  • The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft
  • Affiliates Flock to ‘Soulless’ Scam Gambling Machine

Lenny Zeltser

  • How Security and Privacy Teams Break Barriers Together
  • The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership
  • What to Do With Products Without SSO?
  • Transform the Defender’s Dilemma into the Defender’s Advantage
  • Are CISOs of Security Vendors in Your Community?
  • How to Write Good Incident Response Reports
  • My Story So Far and Your Own Career Journey
  • 3 Opportunities for Cybersecurity Leaders Who Choose to Stay
  • Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
  • How Security Can Better Support Software Engineering Teams

The MPC Lounge

  • 5th Bar-Ilan Winter School 2015: Advances in Practical Multiparty Computation
  • Publicly Auditable Secure Multiparty Computation
  • Faster Maliciously Secure Two-Party Computation Using the GPU
  • Adapt, adapt, adapt
  • MiniTrix for MiniMacs
  • Categorizing MPC
  • Communication-Efficient MPC for General Adversary Structures
  • Fair enough
  • How to use bitcoin to design fair protocols
  • Round-efficient black-box constructions of composable multi-party computation

Root Labs rdist

  • Rebooting
  • In Which You Get a Chance to Save Democracy
  • Was the past better than now?
  • Thought experiment on protocols and noise
  • Timing-safe memcmp and API parity
  • In Defense of JavaScript Crypto

Russ McRee

  • Moving blog to HolisticInfoSec.io
  • toolsmith #133 - Anomaly Detection & Threat Hunting with Anomalize
  • toolsmith #132 - The HELK vs APTSimulator - Part 2
  • toolsmith #131 - The HELK vs APTSimulator - Part 1
  • toolsmith #130 - OSINT with Buscador
  • toolsmith #129 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 2
  • McRee added to ISSA's Honor Roll for Lifetime Achievement
  • toolsmith #128 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 1
  • Toolsmith Tidbit: Windows Auditing with WINspect
  • Toolsmith Release Advisory: Magic Unicorn v2.8

Schneier on Security

  • Rewiring Democracy is Coming Soon
  • AI and the Future of American Politics
  • Friday Squid Blogging: Sperm Whale Eating a Giant Squid
  • Autonomous AI Hacking and the Future of Cybersecurity
  • Flok License Plate Surveillance
  • AI-Enabled Influence Operation Against Iran
  • AI in the 2026 Midterm Elections
  • Friday Squid Blogging: Squid Overfishing in the Southwest Atlantic
  • Daniel Miessler on the AI Attack/Defense Balance
  • Use of Generative AI in Scams

Shtetl-Optimized

  • Sad and happy day
  • The QMA Singularity
  • HSBC unleashes yet another “qombie”: a zombie claim of quantum advantage that isn’t
  • Darkness over America
  • Quantum Information Supremacy
  • For the record
  • Deep Gratitude
  • Staying sane on a zombie planet
  • Deep Zionism
  • Updates!

Troy Hunt

  • Weekly Update 473
  • Court Injunctions are the Thoughts and Prayers of Data Breach Response
  • Weekly Update 472
  • Welcoming CERN to Have I Been Pwned
  • Weekly Update 471
  • HIBP Demo: Querying the API, and the Free Test Key!
  • Weekly Update 470
  • Have I Been Pwned Demos Are Now Live!
  • Weekly Update 469
  • Weekly Update 468

Xavier Mertens

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?
  • [SANS ISC] Quick Malware Triage With Inotify Tools
  • [SANS ISC] From a Zalando Phishing to a RAT
  • [SANS ISC] Show me All Your Windows!
  • [SANS ISC] Are Leaked Credentials Dumps Used by Attackers?
  • [SANS ISC] Do Attackers Pay More Attention to IPv6?

Sec Ops

Checkpoint

  • Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware …
  • Check Point Partners with HackShield to Empower the Next Generation of Cyber Heroes
  • Zero Trust Access Made Simple for Contractors
  • Rhadamanthys 0.9.2: A Stealer That Keeps Evolving
  • Amazon Prime Day 2025: The Dark Side of Deals
  • 5 Essential Cyber Security Tips for Cyber Security Awareness Month
  • The Rising Cyber Threat to Manufacturing: A Call to Action for Executives
  • How to Defend Against Credential Attacks with a Hybrid Mesh Architecture
  • Quantum-Safe Cyber Security: Current Capabilities and the Road Ahead
  • Playing Offside: How Threat Actors Are Warming Up for FIFA 2026

Cloudflare

  • Introducing REACT: Why We Built an Elite Incident Response Team
  • How we found a bug in Go's arm64 compiler
  • Payload on Workers: a full-fledged CMS, running entirely on Cloudflare’s stack
  • Nationwide Internet shutdown in Afghanistan extends localized disruptions
  • 15 years of helping build a better Internet: a look back at Birthday Week 2025
  • Cloudflare just got faster and more secure, powered by Rust
  • Introducing Observatory and Smart Shield — see how the world sees your website, and make …
  • Monitoring AS-SETs and why they matter
  • An AI Index for all our customers
  • Introducing new regional Internet traffic and Certificate Transparency insights on Cloudflare Radar

Google Online Security Blog

  • Accelerating adoption of AI for cybersecurity at DEF CON 33
  • Supporting Rowhammer research to protect the DRAM ecosystem
  • How Pixel and Android are bringing a new level of trust to your images with …
  • Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification
  • Introducing OSS Rebuild: Open Source, Rebuilt to Last
  • Advancing Protection in Chrome on Android
  • Mitigating prompt injection attacks with a layered defense strategy
  • Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store
  • Tracking the Cost of Quantum Factoring
  • What’s New in Android Security and Privacy in 2025

Have I Been Owned

  • Vietnam Airlines - 7,316,915 breached accounts
  • Adpost - 3,339,512 breached accounts
  • Artists&Clients - 95,351 breached accounts
  • HomeRefill - 187,457 breached accounts
  • Latest Pilot Jobs - 118,864 breached accounts
  • Cultura - 1,462,025 breached accounts
  • Bouygues Telecom - 5,685,771 breached accounts
  • Animeify - 808,034 breached accounts
  • FreeOnes - 960,213 breached accounts
  • Miljödata - 870,108 breached accounts

Kaspersky

  • Your anti-OSINT guide: hunting down and deleting everything about you on the internet that you …
  • Security risks of vibe coding and LLM assistants for developers
  • How to protect your car from hacking | Kaspersky official blog
  • Airline-mimicking fraud | Kaspersky official blog
  • The CVE-2025-59489 vulnerability in Unity, and how to fix it in games | Kaspersky official …
  • Detecting DLL hijacking with ML | Kaspersky official blog
  • Phoenix: Rowhammer that works on DDR5 | Kaspersky official blog
  • How to protect yourself from "voting" phishing scams, and avoid losing your WhatsApp account | …
  • What is security hardening? | Kaspersky official blog
  • Internal expertise vs. managed security | Kaspersky official blog

Reddit: /r/netsec

  • r/netsec monthly discussion & tool thread
  • (DEF CON 33) How I hacked over 1,000 car dealerships across the US
  • Finding Critical Bugs in Adobe Experience Manager
  • Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2 - HN Security
  • LLM Honeypot vs. Cryptojacking: Understanding the Enemy
  • Blind Enumeration of gRPC Services
  • A Story About Bypassing Air Canada's In-flight Network Restrictions
  • IAmAntimalware: Inject Malicious Code Into Antivirus
  • More Than DoS (Progress Telerik UI for ASP.NET AJAX Unsafe Reflection CVE-2025-3600) - watchTowr Labs
  • Living off Node.js Addons

Reddit: /r/pwned

  • May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
  • Britain’s Companies Are Being Hacked
  • Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
  • Data breaches you might have missed this month
  • Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data …
  • Has TradingView ever experienced any data breaches?
  • 1 Million Accounts Impacted by the Massive 2023 Glamira Data Breach, 875,000 Emails Exposed
  • Anna Jaques Hospital ransomware breach exposed data of 300K patients
  • Hot Topic Breach Confirmed, Millions of Credit Cards Exposed
  • UnitedHealth breach leaks info on over 100M people. Including medical records.

Search Security

  • Top 15 IT security frameworks and standards explained
  • What is a stealth virus and how does it work?
  • What is Triple DES and why is it disallowed?
  • What is information security (infosec)?
  • How to prevent DoS attacks and what to do if they happen
  • Credit Karma leader shares AI governance lessons learned
  • An explanation of quantum cryptography
  • Build IT resilience to avoid paying ransomware demands
  • The differences between inbound and outbound firewall rules
  • 11 IoT security challenges and how to overcome them

Shodan

  • 5 Free Things for Everybody
  • Deep Dive: Malware Hunter
  • Deep Dive: http.favicon
  • Changelog: www.shodan.io
  • Developer Access to Shodan Trends
  • Accepting Crypto: A Vendor Perspective
  • Historical IP Information
  • nrich: A Tool for Fast IP enrichment
  • Introducing Data Feeds for Search Results
  • Introducing the InternetDB API

Tenable

  • Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of …
  • Exposure Management Beyond The Endpoint
  • Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep
  • How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
  • CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
  • Cybersecurity Snapshot: Cybersecurity Awareness Month Arrives To Find AI Security a Hot Mess, as New …
  • The Buy Vs. Build Dilemma: Pitfalls of the DIY Approach to Exposure Management
  • The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed …
  • Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To …
  • CVE-2025-20333, CVE-2025-20362: Frequently Asked Questions About Zero-Day Cisco Adaptive Security Appliance (ASA) and Firewall Threat …

Threatpost

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Twitter Whistleblower Complaint: The TL;DR Version
  • Firewall Bug Under Active Attack Triggers CISA Warning
  • Fake Reservation Links Prey on Weary Travelers
  • iPhone Users Urged to Update to Patch 2 Zero-Days
  • Google Patches Chrome’s Fifth Zero-Day of the Year

Trusted Sec

  • Skimming Credentials with Azure's Front Door WAF
  • PCI P2PE vs. E2EE – Scoping it Out
  • HIPAA Applicability - Understanding the Security, Breach Notification, and Privacy Rules
  • HIPAA Business Associates - What’s Your Function?
  • WSUS Is SUS: NTLM Relay Attacks in Plain Sight
  • HIPAA Covered Entities - It’s More Than Just PHI
  • Detecting Active Directory Password-Spraying with a Honeypot Account
  • HIPAA Protected Health Information - When Health Information Isn’t Protected
  • Protecting Backup and Recovery in the Age of Ransomware
  • Penetration Testing and Burnout

App Sec

Checkmarx

  • Kudos to the Unsung Heroes in our Current Times: Software Developers
  • Deliver Secure Software from Home: Checkmarx Offers Free 45-Day Codebashing Trial
  • Why “Shift Left” in DevOps is really “Shift Center”
  • Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
  • A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead
  • Discussing AppSec Policies within DevSecOps
  • RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle
  • Free your Developers from Mundane Tasks
  • Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
  • Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)

iSec Partners

  • Introducing opinel: Scout2's favorite tool
  • IAM user management strategy (part 2)
  • iSEC audit of MediaWiki
  • Work daily with enforced MFA-protected API access
  • Use and enforce Multi-Factor Authentication
  • iSEC reviews SecureDrop
  • Recognizing and Preventing TOCTOU Whitepaper
  • IAM user management strategy
  • Do not use your AWS root account
  • Announcing the AWS blog post series

NCC Group Crypto Services

  • Implementing Optimized Cryptography for Embedded Systems
  • Fast and Secure Implementations of the Falcon Post-Quantum Cryptography Signature Algorithm
  • The Longest Blockchain is not the Strongest Blockchain
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
  • Bitcoin Orphan Transactions and CVE-2012-3789
  • Undefined Behavior Is Really Undefined
  • Ethereum Top 10 Security Vulnerabilities For Smart Contracts
  • Confidential Transactions from Basic Principles
  • New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish)
  • What are State-sized adversaries doing to spy on us? Or how to backdoor Diffie-Hellman

Offensive Security

  • Red Teaming vs Pentesting: What’s the Difference?
  • How to Prevent Prompt Injection
  • What Is Ethical Hacking?
  • Red Team Exercise
  • Best Cybersecurity Certifications for Beginners
  • 5 Signs You’re Ready for a Career in Cybersecurity
  • 9 OSCP Study Tips to Help You Succeed
  • CVE-2025-29891 – Apache Camel Exploit via CAmelExecCommandArgs Header Injection
  • CVE-2025-30208 – Vite Arbitrary File Read via @fs Path Traversal Bypass
  • Get Noticed: 5 Cybersecurity Job Hunt Tips

The Hacker News

  • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
  • Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
  • ⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
  • Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
  • Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
  • Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
  • Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
  • New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs
  • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
  • Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts

Sysadmin

AWS Blog

  • AWS Weekly Roundup: Amazon Quick Suite, Amazon EC2, Amazon EKS, and more (October 13, 2025)
  • Announcing Amazon Quick Suite: your agentic teammate for answering questions and taking action
  • New general-purpose Amazon EC2 M8a instances are now available
  • Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances
  • AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest
  • AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and …
  • Announcing Amazon ECS Managed Instances for containerized applications
  • Announcing AWS Outposts third-party storage integration with Dell and HPE
  • Introducing Claude Sonnet 4.5 in Amazon Bedrock: Anthropic’s most intelligent model, best for coding and …
  • AWS Weekly Roundup: Amazon S3, Amazon Bedrock AgentCore, AWS X-Ray and more (September 29, 2025)

Cyberciti

  • Download of the day: GIMP 3.0 is FINALLY Here!
  • Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems
  • ZFS Raidz Expansion Finally, Here in version 2.3.0
  • lnav – Awesome terminal log file viewer for Linux and Unix
  • sttr – Awesome Linux & Unix tool for transformation of the string
  • How to block AI Crawler Bots using robots.txt file
  • Debian Linux 12.1 released with Security Updates
  • Setting up VSCode for Ansible Lightspeed AI in Ubuntu 22.04 desktop
  • How to upgrade FreeBSD 13.1 to 13.2 release

Distro Watch

  • Development Release: MX Linux 25 Beta 1
  • DistroWatch Weekly, Issue 1140
  • Distribution Release: DietPi 9.17
  • Development Release: Zorin OS 18 Beta
  • Distribution Release: IPFire 2.29 Core 197
  • Development Release: Ubuntu 25.10 Beta
  • Development Release: Linux Mint 7 Beta "LMDE"
  • Distribution Release: Tails 7.0
  • Distribution Release: Security Onion 2.4.180
  • Distribution Release: Omarchy 3.0.1

Netflix Techblog

  • 100X Faster: How We Supercharged Netflix Maestro’s Workflow Engine
  • Building a Resilient Data Platform with Write-Ahead Log at Netflix
  • Scaling Muse: How Netflix Powers Data-Driven Creative Insights at Trillion-Row Scale
  • Empowering Netflix Engineers with Incident Management
  • From Facts & Metrics to Media Machine Learning: Evolving the Data Engineering Function at Netflix
  • ML Observability: Bringing Transparency to Payments and Beyond
  • Accelerating Video Quality Control at Netflix with Pixel Error Detection
  • Behind the Streams: Live at Netflix. Part 1
  • Netflix Tudum Architecture: from CQRS with Kafka to CQRS with RAW Hollow
  • Driving Content Delivery Efficiency Through Classifying Cache Misses

Reddit: /r/linux

  • The EU is trying to implement a plan to use AI to scan and report …
  • EU is proposing a new mass surveillance law and they are asking the public for …
  • New California law forces operating systems to ask for your age
  • Today KDE is 29 years old and they are celebrating kicking off their yearly fundraiser
  • Surely Ubuntu is still better than Windows?
  • Alright. Who else noticed this in Tron: Ares?
  • No one told me kernel panics could be diagonal
  • My Journey to Fedora Silverblue: Why I Think Atomic is the Future of Linux
  • Just got into linux having fun
  • Intel Lands Big Linux GPU Driver Fix: Fixing Rendering Issues & Game Hangs/Crashes

Reddit: /r/linuxadmin

  • Logic Behind User Masks(umask)??
  • A fail2ban filter for postfix dmarc check
  • Simplifying OpenTelemetry pipelines in Kubernetes
  • MsTeams -teams for linux.
  • Help with SSSD and non-posix groups in LDAP
  • RHCSA exam and Linux Admin jobs
  • File System Setup and Access Control/ Ceph
  • laptop for Devops(modern system administration)
  • Need feedbacks and suggestions
  • how-to make systemd log client connects to socket?

Reddit: /r/sysadmin

  • Received an offer from coworker to gain some IT experience, what to do?
  • Places: changing a desk pool email address?
  • Just now bombed my HPE6-A86
  • 📣 Looking for Technical Blueprint Templates
  • evilginx2 detection - Check by Cyberdrain
  • Anyone managed to get Cisco SmartNet for gear bought from the gray market?
  • Did Microsoft remove "protected app" from Microsoft 365 Copilot in Cloud app?
  • New password manager needed with Microsoft SSO
  • How are you actually tracking assets across 200+ remote employees?
  • Trelica & Jumpcloud

Reddit: /r/homelab

  • Homelab Setup
  • Locked out
  • Is this a good price?
  • Find WWN of Virtual Disks iDRAC10/racadm
  • Is cudy laying about hardware spec.
  • NVIDA GPU B Frame Support
  • 10Gbit network card for PCIe x4 slot?
  • Seeking Advice on Lightweight Self-Hosted Workout/Training Service with SQLite
  • Homelab / Server Hosting
  • I wrote a guide on migrating a Hyper-V VM to Proxmox

Stack Exchange: Security

  • Can /proc/PID/fd be used to snoop on anonymous sockets?
  • Access token and userinfo caching in backend - security issue?
  • Need help with Linux BPFDoor detection - false positive or not? [closed]
  • Question trojan [closed]
  • jwt authentication
  • AWS Session manager vs AWS EC2 Instance Connect Endpoint: Which is more secure?
  • Eduroam certificate - is it safe? [duplicate]
  • help understanding server identity fingerprint [hashing vs encryption process & terminology]
  • "Reverse" DMA attack
  • How to tell if clients are connecting from a specific (i.e. "allowed") country (and not …

Tech News

Ars Technica

  • Hackers can steal 2FA codes and private messages from Android phones
  • Why Signal’s post-quantum makeover is an amazing engineering achievement
  • Microsoft warns of new “Payroll Pirate” scam stealing employees’ direct deposits
  • AI models can acquire backdoors from surprisingly few malicious documents
  • Discord says hackers stole government IDs of 70,000 users
  • Bank of England warns AI stock bubble rivals 2000 dotcom peak
  • Salesforce says it won’t pay extortion demand in 1 billion records breach
  • Synology caves, walks back some drive restrictions on upcoming NAS models
  • Ars Live: Is the AI bubble about to pop? Ed Zitron is on with Ars …
  • AMD wins massive AI chip deal from OpenAI with stock sweetener

Tech Crunch

  • Top 10 AI Tools That Will Transform Your Content Creation in 2025
  • LimeWire AI Studio Review 2023: Details, Pricing & Features
  • Top 10 AI Tools in 2023 That Will Make Your Life Easier
  • Top 10 AI Content Generator & Writer Tools in 2022
  • Beginner Guide to CJ Affiliate (Commission Junction) in 2022
  • TOP 11 AI MARKETING TOOLS YOU SHOULD USE (Updated 2022)
  • Most Frequently Asked Questions About Affiliate Marketing
  • What is Blockchain: Everything You Need to Know (2022)
  • ProWritingAid VS Grammarly: Which Grammar Checker is Better in (2022) ?
  • Sellfy Review 2022: How Good Is This Ecommerce Platform?

The Verge

  • TiVo no longer makes DVRs
  • Nvidia’s ‘personal AI supercomputer’ goes on sale October 15th
  • Facebook is adding job listings, again
  • Microsoft AI announces first image generator created in-house
  • Google will let you hide sponsored results in search — after you’ve seen them
  • Tesla Cybertruck sales are flatlining
  • New California law requires AI to tell you it’s AI
  • California enacts its own internet age-gating law
  • Apple TV Plus is being rebranded to… Apple TV
  • EcoFlow’s Delta Pro Ultra X can power a home for weeks
  • Back to top
  • RSS
  • GitHub