Hacker Newsnew | past | comments | ask | show | jobs | submit | pedro84's submissionslogin
1.KeyTrap: Serious Vulnerability in the Internet Infrastructure (athene-center.de)
1 point by pedro84 on June 11, 2024 | past
2.How to securely build product features using AI APIs (tldrsec.com)
2 points by pedro84 on July 11, 2023 | past
3.A new way to parse plain text tables (kellybrazil.com)
3 points by pedro84 on March 28, 2022 | past
4.The Collapse of Putin’s Disinformation Machinery (wired.com)
8 points by pedro84 on March 10, 2022 | past
5.VMSA-2021-0010: What You Need to Know (vmware.com)
2 points by pedro84 on May 25, 2021 | past
6.Unauthorized RCE in VMware VCenter (ptsecurity.com)
13 points by pedro84 on Feb 24, 2021 | past | 1 comment
7.Cross Layer Attacks and How to Use Them (For DNS Cache Poisoning (arxiv.org)
1 point by pedro84 on Dec 16, 2020 | past
8.How to Store Session Tokens in a Browser (and the Impacts of Each) (ropnop.com)
4 points by pedro84 on Oct 6, 2020 | past | 1 comment
9.On modern hardware the min-max heap beats a binary heap (probablydance.com)
244 points by pedro84 on Sept 2, 2020 | past | 43 comments
10.The Octopus Scanner Malware: Attacking the open source supply chain (securitylab.github.com)
2 points by pedro84 on May 29, 2020 | past
11.OpenSSH to deprecate SHA-1 logins due to security risk (zdnet.com)
1 point by pedro84 on May 27, 2020 | past | 1 comment
12.Decentralized Privacy-Preserving Proximity Tracing (github.com/dp-3t)
3 points by pedro84 on April 9, 2020 | past
13.Playing on Kansas City Radio: Russian Propaganda (nytimes.com)
4 points by pedro84 on Feb 14, 2020 | past
14.Setting the Record Straight on OSS vs. Perens: Implications on Stewards of GPL (grsecurity.net)
2 points by pedro84 on Feb 10, 2020 | past
15.A Dead Simple VPN (github.com/jedisct1)
7 points by pedro84 on July 17, 2019 | past | 4 comments
16.Block Breakers – block cipher cryptanalysis (davidwong.fr)
1 point by pedro84 on July 11, 2019 | past
17.What is Benford’s Law and why is it important for data science? (towardsdatascience.com)
2 points by pedro84 on July 3, 2019 | past
18.The Return of the WIZard: RCE in Exim (CVE-2019-10149) (openwall.com)
1 point by pedro84 on June 6, 2019 | past | 1 comment
19.SAE Side-Channel Attacks (w1.fi)
2 points by pedro84 on April 10, 2019 | past
20.Hearing your touch: A new acoustic side channel on smartphones (arxiv.org)
2 points by pedro84 on April 4, 2019 | past
21.The Rule of 2 (googlesource.com)
1 point by pedro84 on April 4, 2019 | past
22.Thunderclap: Modern computers are vulnerable to malicious peripheral devices (thunderclap.io)
2 points by pedro84 on Feb 27, 2019 | past
23.The Missing Security Primer for Bare Metal Cloud Services (eclypsium.com)
4 points by pedro84 on Feb 26, 2019 | past
24.Master of Web Puppets: Abusing Web Browsers for Persistence [pdf] (ndss-symposium.org)
3 points by pedro84 on Feb 25, 2019 | past
25.Article 13: “badness” rate (twitter.com/alecmuffett)
2 points by pedro84 on Feb 17, 2019 | past
26.GZ-Sort: A utility for sorting big files (kmkeen.com)
1 point by pedro84 on Feb 15, 2019 | past
27.A monologue followed by some dialogue on pagination (bubblin.io)
1 point by pedro84 on Feb 13, 2019 | past
28.CVE-2019-5736: Escape from Docker and Kubernetes Containers to Root on Host (blog.dragonsector.pl)
2 points by pedro84 on Feb 13, 2019 | past
29.Privilege Escalation in Ubuntu Linux (dirty_sock Exploit) (shenaniganslabs.io)
2 points by pedro84 on Feb 13, 2019 | past
30.Reverse RDP Attack: Code Execution on RDP Clients (checkpoint.com)
5 points by pedro84 on Feb 5, 2019 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: