Hacker Newsnew | past | comments | ask | show | jobs | submit | cws's submissionslogin
1.Metacognitive Incommensurability: The Dinner Table Wall (interpoiesis.substack.com)
5 points by cws 3 months ago | past
2.Software Bill of Materials Requirements in DoD and Federal Guidance (eclypsium.com)
5 points by cws 4 months ago | past
3.Open Source Tools to Detect CVE-2024-54085 (eclypsium.com)
4 points by cws 6 months ago | past
4.CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks (bleepingcomputer.com)
8 points by cws 6 months ago | past
5.OpenBMC Security in Practice: Vulnerabilities, Variants, and AMI MegaRAC OneTree [pdf] (eclypsium.com)
4 points by cws 7 months ago | past
6.Skittle Factory Dementia Monkey Titty Monetization (parakeet.substack.com)
6 points by cws 9 months ago | past
7.BMC&C Part 3: New AMI MegaRAC Baseboard Management Controller Vulnerabilities (eclypsium.com)
2 points by cws 10 months ago | past
8.Text to CAD Public Alpha (zoo.dev)
2 points by cws on July 11, 2024 | past
9.We need to take satellite ground station security seriously (spacenews.com)
4 points by cws on June 4, 2024 | past
10.Measuring the Persuasiveness of Language Models (anthropic.com)
3 points by cws on May 3, 2024 | past
11.2024 Verizon Data Breach Investigation Report [pdf] (verizon.com)
122 points by cws on May 1, 2024 | past | 49 comments
12.National Renewable Energy Lab Releases First Clean Energy Cybersecurity Report (xage.com)
1 point by cws on Jan 18, 2024 | past
13.A Technical Analysis of How Spring4Shell (CVE-2022-22965) Works (extrahop.com)
14 points by cws on March 31, 2022 | past | 7 comments
14.Analyzing SolarWinds Orion Sunburst DNS Traffic for Threat Intelligence (extrahop.com)
1 point by cws on Dec 17, 2020 | past
15.New Critical RCE Vulnerability in Drupal Core (drupal.org)
1 point by cws on Nov 20, 2020 | past
16.See What Zoom Participants Are Typing by Watching Their Shoulder Movements (techxplore.com)
1 point by cws on Nov 20, 2020 | past
17.The HD Video Feedback Kinetic Sculpture (youtube.com)
2 points by cws on Nov 20, 2020 | past
18.How to Respond to Citrix ADC Vulnerability (CVE-2019-19781) (extrahop.com)
1 point by cws on Feb 3, 2020 | past
19.We busted a fake Chrome extension that was trying to steal data (extrahop.com)
108 points by cws on Dec 7, 2018 | past | 32 comments
20.The NSA Doesn't Need Zero-Days to Own You (extrahop.com)
3 points by cws on Nov 17, 2016 | past
21.Recovering Ransomware-encrypted files from packet capture (extrahop.com)
6 points by cws on Aug 25, 2016 | past | 2 comments
22.For ransomware detection, behavior beats signatures (extrahop.com)
5 points by cws on June 15, 2016 | past
23.Network Performance Monitoring Is Dead (networkworld.com)
18 points by cws on April 29, 2016 | past
24.We stopped one healthcare ransomware what about the rest? (extrahop.com)
9 points by cws on Feb 25, 2016 | past | 4 comments
25.The NSA's worst nightmare (extrahop.com)
36 points by cws on Feb 17, 2016 | past | 12 comments
26.How much data does the Super Bowl create? (extrahop.com)
5 points by cws on Feb 9, 2016 | past
27.Finding the ghosts in my machines via DHCP troubleshooting (extrahop.com)
3 points by cws on Dec 9, 2015 | past
28.Quiet time: the secret to finding resource leaks (extrahop.com)
5 points by cws on Dec 1, 2015 | past
29.Network Engineers: Become an ExtraHop Ambassador (extrahop.com)
2 points by cws on Sept 14, 2015 | past
30.Learning a new codebase? Static Code Analysis is your friend (extrahop.com)
9 points by cws on Sept 10, 2015 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: