Hacker Newsnew | past | comments | ask | show | jobs | submit | pedro84's submissionslogin
1.Autonomous Vulnerability Hunting with MCP (blog.zsec.uk)
4 points by pedro84 15 days ago | past
2.Vulnerability research is cooked (sockpuppet.org)
267 points by pedro84 19 days ago | past | 170 comments
3.KeyTrap: Serious Vulnerability in the Internet Infrastructure (athene-center.de)
1 point by pedro84 on June 11, 2024 | past
4.How to securely build product features using AI APIs (tldrsec.com)
2 points by pedro84 on July 11, 2023 | past
5.A new way to parse plain text tables (kellybrazil.com)
3 points by pedro84 on March 28, 2022 | past
6.The Collapse of Putin’s Disinformation Machinery (wired.com)
8 points by pedro84 on March 10, 2022 | past
7.VMSA-2021-0010: What You Need to Know (vmware.com)
2 points by pedro84 on May 25, 2021 | past
8.Unauthorized RCE in VMware VCenter (ptsecurity.com)
13 points by pedro84 on Feb 24, 2021 | past | 1 comment
9.Cross Layer Attacks and How to Use Them (For DNS Cache Poisoning (arxiv.org)
1 point by pedro84 on Dec 16, 2020 | past
10.How to Store Session Tokens in a Browser (and the Impacts of Each) (ropnop.com)
4 points by pedro84 on Oct 6, 2020 | past | 1 comment
11.On modern hardware the min-max heap beats a binary heap (probablydance.com)
244 points by pedro84 on Sept 2, 2020 | past | 43 comments
12.The Octopus Scanner Malware: Attacking the open source supply chain (securitylab.github.com)
2 points by pedro84 on May 29, 2020 | past
13.OpenSSH to deprecate SHA-1 logins due to security risk (zdnet.com)
1 point by pedro84 on May 27, 2020 | past | 1 comment
14.Decentralized Privacy-Preserving Proximity Tracing (github.com/dp-3t)
3 points by pedro84 on April 9, 2020 | past
15.Playing on Kansas City Radio: Russian Propaganda (nytimes.com)
4 points by pedro84 on Feb 14, 2020 | past
16.Setting the Record Straight on OSS vs. Perens: Implications on Stewards of GPL (grsecurity.net)
2 points by pedro84 on Feb 10, 2020 | past
17.A Dead Simple VPN (github.com/jedisct1)
7 points by pedro84 on July 17, 2019 | past | 4 comments
18.Block Breakers – block cipher cryptanalysis (davidwong.fr)
1 point by pedro84 on July 11, 2019 | past
19.What is Benford’s Law and why is it important for data science? (towardsdatascience.com)
2 points by pedro84 on July 3, 2019 | past
20.The Return of the WIZard: RCE in Exim (CVE-2019-10149) (openwall.com)
1 point by pedro84 on June 6, 2019 | past | 1 comment
21.SAE Side-Channel Attacks (w1.fi)
2 points by pedro84 on April 10, 2019 | past
22.Hearing your touch: A new acoustic side channel on smartphones (arxiv.org)
2 points by pedro84 on April 4, 2019 | past
23.The Rule of 2 (googlesource.com)
1 point by pedro84 on April 4, 2019 | past
24.Thunderclap: Modern computers are vulnerable to malicious peripheral devices (thunderclap.io)
2 points by pedro84 on Feb 27, 2019 | past
25.The Missing Security Primer for Bare Metal Cloud Services (eclypsium.com)
4 points by pedro84 on Feb 26, 2019 | past
26.Master of Web Puppets: Abusing Web Browsers for Persistence [pdf] (ndss-symposium.org)
3 points by pedro84 on Feb 25, 2019 | past
27.Article 13: “badness” rate (twitter.com/alecmuffett)
2 points by pedro84 on Feb 17, 2019 | past
28.GZ-Sort: A utility for sorting big files (kmkeen.com)
1 point by pedro84 on Feb 15, 2019 | past
29.A monologue followed by some dialogue on pagination (bubblin.io)
1 point by pedro84 on Feb 13, 2019 | past
30.CVE-2019-5736: Escape from Docker and Kubernetes Containers to Root on Host (blog.dragonsector.pl)
2 points by pedro84 on Feb 13, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: