Hacker Newsnew | past | comments | ask | show | jobs | submit | pedro84's submissionslogin
1.Vulnerability research is cooked (sockpuppet.org)
251 points by pedro84 2 days ago | past | 168 comments
2.KeyTrap: Serious Vulnerability in the Internet Infrastructure (athene-center.de)
1 point by pedro84 on June 11, 2024 | past
3.How to securely build product features using AI APIs (tldrsec.com)
2 points by pedro84 on July 11, 2023 | past
4.A new way to parse plain text tables (kellybrazil.com)
3 points by pedro84 on March 28, 2022 | past
5.The Collapse of Putin’s Disinformation Machinery (wired.com)
8 points by pedro84 on March 10, 2022 | past
6.VMSA-2021-0010: What You Need to Know (vmware.com)
2 points by pedro84 on May 25, 2021 | past
7.Unauthorized RCE in VMware VCenter (ptsecurity.com)
13 points by pedro84 on Feb 24, 2021 | past | 1 comment
8.Cross Layer Attacks and How to Use Them (For DNS Cache Poisoning (arxiv.org)
1 point by pedro84 on Dec 16, 2020 | past
9.How to Store Session Tokens in a Browser (and the Impacts of Each) (ropnop.com)
4 points by pedro84 on Oct 6, 2020 | past | 1 comment
10.On modern hardware the min-max heap beats a binary heap (probablydance.com)
244 points by pedro84 on Sept 2, 2020 | past | 43 comments
11.The Octopus Scanner Malware: Attacking the open source supply chain (securitylab.github.com)
2 points by pedro84 on May 29, 2020 | past
12.OpenSSH to deprecate SHA-1 logins due to security risk (zdnet.com)
1 point by pedro84 on May 27, 2020 | past | 1 comment
13.Decentralized Privacy-Preserving Proximity Tracing (github.com/dp-3t)
3 points by pedro84 on April 9, 2020 | past
14.Playing on Kansas City Radio: Russian Propaganda (nytimes.com)
4 points by pedro84 on Feb 14, 2020 | past
15.Setting the Record Straight on OSS vs. Perens: Implications on Stewards of GPL (grsecurity.net)
2 points by pedro84 on Feb 10, 2020 | past
16.A Dead Simple VPN (github.com/jedisct1)
7 points by pedro84 on July 17, 2019 | past | 4 comments
17.Block Breakers – block cipher cryptanalysis (davidwong.fr)
1 point by pedro84 on July 11, 2019 | past
18.What is Benford’s Law and why is it important for data science? (towardsdatascience.com)
2 points by pedro84 on July 3, 2019 | past
19.The Return of the WIZard: RCE in Exim (CVE-2019-10149) (openwall.com)
1 point by pedro84 on June 6, 2019 | past | 1 comment
20.SAE Side-Channel Attacks (w1.fi)
2 points by pedro84 on April 10, 2019 | past
21.Hearing your touch: A new acoustic side channel on smartphones (arxiv.org)
2 points by pedro84 on April 4, 2019 | past
22.The Rule of 2 (googlesource.com)
1 point by pedro84 on April 4, 2019 | past
23.Thunderclap: Modern computers are vulnerable to malicious peripheral devices (thunderclap.io)
2 points by pedro84 on Feb 27, 2019 | past
24.The Missing Security Primer for Bare Metal Cloud Services (eclypsium.com)
4 points by pedro84 on Feb 26, 2019 | past
25.Master of Web Puppets: Abusing Web Browsers for Persistence [pdf] (ndss-symposium.org)
3 points by pedro84 on Feb 25, 2019 | past
26.Article 13: “badness” rate (twitter.com/alecmuffett)
2 points by pedro84 on Feb 17, 2019 | past
27.GZ-Sort: A utility for sorting big files (kmkeen.com)
1 point by pedro84 on Feb 15, 2019 | past
28.A monologue followed by some dialogue on pagination (bubblin.io)
1 point by pedro84 on Feb 13, 2019 | past
29.CVE-2019-5736: Escape from Docker and Kubernetes Containers to Root on Host (blog.dragonsector.pl)
2 points by pedro84 on Feb 13, 2019 | past
30.Privilege Escalation in Ubuntu Linux (dirty_sock Exploit) (shenaniganslabs.io)
2 points by pedro84 on Feb 13, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: