171
2
Using Aisle to Find Vulnerabilities in Amazon's Crypto Stack: AWS-LC and S2n-TLS (aisle.com)
106
AISLE’s autonomous analyzer found all CVEs in the January OpenSSL release (aisle.com)
7
The end of the curl bug-bounty (haxx.se)
3
Investigating shared dictionaries and ChatGPT breakage in Firefox (joshua.hu)
1
Gixy-Next: Nginx Configuration Security and Hardening Scanner (gixy.io)
2
Iranian Censorship, Bypasses, Browser Extensions, and Proxies (joshua.hu)
2
The Weakest Link Fallacy (ru.nl)
2
Popular NPM linter packages hijacked via phishing to drop malware (bleepingcomputer.com)
2
Tail Call Optimization Implementation in JavaScript Engines (stackoverflow.com)
1
Simulating Time with Square-Root Space (arxiv.org)
4
CVE-2025-27363: out of bounds write in FreeType <= 2.13.0 (openwall.com)
41
Gixy: Nginx Configuration Static Analyzer (github.com/dvershinin)
1
Un-Autocorrector (lingojam.com)
413
Teen on Musk's DOGE team graduated from 'The Com' (krebsonsecurity.com)
4
Pyramid Schemes in Albania (wikipedia.org)
4
Getting Cheated in a Videogame Led Him to a World of Online Crime (wsj.com)
123
U.S. Army Soldier Arrested in AT&T, Verizon Extortions (krebsonsecurity.com)
1
The cost of a NAND chip off attack is 170.83€ (errno.fr)
3
Toynbee Tiles (wikipedia.org)
28
Upcoming Hardening in PHP (dustri.org)
5
Zendesk: Email user verification bug bounty report retrospective (zendesk.com)
342
1 bug, $50k in bounties, a Zendesk backdoor (gist.github.com)
1
Webcam support on a MacBook running FreeBSD using PCI passthrough (joshua.hu)
2
Simulation of the 1972 Atari game Pong at a circuit level (falstad.com)
1
FreeBSD on MacBook Pro Retina 2014 (joshua.hu)
1
Show HN: Awk Version Comparison Dashboard (megamansec.github.io)
1
Watch How a Hacker's Infrared Laser Can Spy on Your Laptop's Keystrokes (wired.com)
1
"One of the most original expositions": The Vienna Poster Exhibition in 1888 (austrianposters.at)
1
Shadow of the Sun (2021) (mattlakeman.org)
1
Australian SIA calls for federal regulation of cyber security sector (thenightly.com.au)
2
Ask HN: What was the story of the attempted addition of a backdoor in WebKit?
2
Fixing typos and breaching Microsoft's perimeter (johnstawinski.com)
3
Brendanwall.jpg (brendangregg.com)
3
Geon/Shebang-Abuse (github.com/geon)
2
Show HN: LDAP Watchdog: Realtime LDAP monitoring for detecting directory changes (github.com/megamansec)
3
Show HN: SSH-Snake: Automated SSH-Based Network Traversal (github.com/megamansec)
25
Intentionally buggy commits for fame and papers (2021) (lwn.net)
2
The End of Innocence: What Happened After Apple Fired Steve Jobs (wired.com)
2
Cosmo, the Hacker 'God' Who Fell to Earth (wired.com)
4
Ask HN: Is there ever a reason to expose an SQL Server to the internet?
9
Facebook Messenger now limits WebP file attachments
3
Are the BSDs dying? Some security researchers think so (2018) (csoonline.com)
2
Speeding up NMAP service scanning 16x (joshua.hu)
1
How I Hacked Hacker News (2009) (news.ycombinator.com)
2
Everything that uses configurations should report the values they are using (joshua.hu)
4