| 1. | | Metacognitive Incommensurability: The Dinner Table Wall (interpoiesis.substack.com) |
| 5 points by cws 3 months ago | past |
|
| 2. | | Software Bill of Materials Requirements in DoD and Federal Guidance (eclypsium.com) |
| 5 points by cws 4 months ago | past |
|
| 3. | | Open Source Tools to Detect CVE-2024-54085 (eclypsium.com) |
| 4 points by cws 6 months ago | past |
|
| 4. | | CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks (bleepingcomputer.com) |
| 8 points by cws 6 months ago | past |
|
| 5. | | OpenBMC Security in Practice: Vulnerabilities, Variants, and AMI MegaRAC OneTree [pdf] (eclypsium.com) |
| 4 points by cws 7 months ago | past |
|
| 6. | | Skittle Factory Dementia Monkey Titty Monetization (parakeet.substack.com) |
| 6 points by cws 9 months ago | past |
|
| 7. | | BMC&C Part 3: New AMI MegaRAC Baseboard Management Controller Vulnerabilities (eclypsium.com) |
| 2 points by cws 10 months ago | past |
|
| 8. | | Text to CAD Public Alpha (zoo.dev) |
| 2 points by cws on July 11, 2024 | past |
|
| 9. | | We need to take satellite ground station security seriously (spacenews.com) |
| 4 points by cws on June 4, 2024 | past |
|
| 10. | | Measuring the Persuasiveness of Language Models (anthropic.com) |
| 3 points by cws on May 3, 2024 | past |
|
| 11. | | 2024 Verizon Data Breach Investigation Report [pdf] (verizon.com) |
| 122 points by cws on May 1, 2024 | past | 49 comments |
|
| 12. | | National Renewable Energy Lab Releases First Clean Energy Cybersecurity Report (xage.com) |
| 1 point by cws on Jan 18, 2024 | past |
|
| 13. | | A Technical Analysis of How Spring4Shell (CVE-2022-22965) Works (extrahop.com) |
| 14 points by cws on March 31, 2022 | past | 7 comments |
|
| 14. | | Analyzing SolarWinds Orion Sunburst DNS Traffic for Threat Intelligence (extrahop.com) |
| 1 point by cws on Dec 17, 2020 | past |
|
| 15. | | New Critical RCE Vulnerability in Drupal Core (drupal.org) |
| 1 point by cws on Nov 20, 2020 | past |
|
| 16. | | See What Zoom Participants Are Typing by Watching Their Shoulder Movements (techxplore.com) |
| 1 point by cws on Nov 20, 2020 | past |
|
| 17. | | The HD Video Feedback Kinetic Sculpture (youtube.com) |
| 2 points by cws on Nov 20, 2020 | past |
|
| 18. | | How to Respond to Citrix ADC Vulnerability (CVE-2019-19781) (extrahop.com) |
| 1 point by cws on Feb 3, 2020 | past |
|
| 19. | | We busted a fake Chrome extension that was trying to steal data (extrahop.com) |
| 108 points by cws on Dec 7, 2018 | past | 32 comments |
|
| 20. | | The NSA Doesn't Need Zero-Days to Own You (extrahop.com) |
| 3 points by cws on Nov 17, 2016 | past |
|
| 21. | | Recovering Ransomware-encrypted files from packet capture (extrahop.com) |
| 6 points by cws on Aug 25, 2016 | past | 2 comments |
|
| 22. | | For ransomware detection, behavior beats signatures (extrahop.com) |
| 5 points by cws on June 15, 2016 | past |
|
| 23. | | Network Performance Monitoring Is Dead (networkworld.com) |
| 18 points by cws on April 29, 2016 | past |
|
| 24. | | We stopped one healthcare ransomware what about the rest? (extrahop.com) |
| 9 points by cws on Feb 25, 2016 | past | 4 comments |
|
| 25. | | The NSA's worst nightmare (extrahop.com) |
| 36 points by cws on Feb 17, 2016 | past | 12 comments |
|
| 26. | | How much data does the Super Bowl create? (extrahop.com) |
| 5 points by cws on Feb 9, 2016 | past |
|
| 27. | | Finding the ghosts in my machines via DHCP troubleshooting (extrahop.com) |
| 3 points by cws on Dec 9, 2015 | past |
|
| 28. | | Quiet time: the secret to finding resource leaks (extrahop.com) |
| 5 points by cws on Dec 1, 2015 | past |
|
| 29. | | Network Engineers: Become an ExtraHop Ambassador (extrahop.com) |
| 2 points by cws on Sept 14, 2015 | past |
|
| 30. | | Learning a new codebase? Static Code Analysis is your friend (extrahop.com) |
| 9 points by cws on Sept 10, 2015 | past | 1 comment |
|
|
| More |