Denard.me
  • Blog
  • Dashboard
    • Dashboard
    • - Security Experts
    • - Security Operations
    • - Application Security
    • - Sysadmin
    • - Tech News
  • Services
  • Archives
  • Résumé
  • Contact

Security Experts

Anthony Ferrara

  • Wiring a Home Network
  • A PHP Compiler, aka The FFI Rabbit Hole
  • Protecting Against XSS In RAILS - JavaScript Contexts
  • Disclosure: WordPress WPDB SQL Injection - Technical
  • Disclosure: WordPress WPDB SQL Injection - Background
  • Ponderings on Odoriferous Syntactical Constructifications
  • Building an 8-bit Computer
  • Trust
  • All About Middleware
  • Simple, Easy, Risk and Change

Chris Hoff

  • On building fire extinguishers and fighting fires…
  • The 3 Immutable Rules Of Presentations…
  • Looking Forward to Catching Up At RSA…
  • Attribution is the new black…what’s in a name, anyway?
  • The Active Response Continuum & The Right To Cyber Self Defense…
  • Incomplete Thought: The Time Is Now For OCP-like White Box Security Appliances
  • J-Law Nudie Pics, Jeremiah, Privacy and Dropbox – An Epic FAIL of Mutual Distraction
  • How To Be a Cloud Mogul(l) – Our 2014 RSA “Dueling Banjos/Cloud/DevOps” Talk
  • On the Topic Of ‘Stopping’ DDoS.
  • The Easiest $20 I ever saved…

Dan Kaminsky: Blog

  • Hacking the Universe with Quantum Encraption
  • Read My Lips: Let’s Kill 0Day
  • The Cryptographically Provable Con Man
  • Validating Satoshi (Or Not)
  • “The Feds Have Let The Cyber World Burn. Let’s Put the Fires Out.”
  • I Might Be Afraid Of This Ghost
  • A Skeleton Key of Unknown Strength
  • Defcon 23: Let’s End Clickjacking
  • Safe Computing In An Unsafe World: Die Zeit Interview
  • Talking with Stewart Baker

Elliptic News

  • Celebrating 40 years of Elliptic Curves in Cryptography (ECC), August 11, 2025
  • 25th Workshop on Elliptic Curve Cryptography, Taipei, Taiwan, Oct 30 – Nov 1, 2024
  • New cryptanalysis of M-SIDH isogeny cryptography
  • SIAM Conference on Applied Algebraic Geometry (AG23)
  • Some comments on the CSIDH group action
  • Equivalence between CDH and DLP
  • EdDSA standardized
  • Attacks on SIDH/SIKE
  • Breaking supersingular isogeny Diffie-Hellman (SIDH)
  • Hertzbleed Attack

Fillipio

  • Encrypting Files with Passkeys and age
  • You Should Run a Certificate Transparency Log
  • Benchmarking RSA Key Generation
  • frood, an Alpine initramfs NAS
  • Accumulated Test Vectors
  • The FIPS Compliance of HKDF
  • Let’s All Agree to Use Seeds as ML-KEM Keys
  • age Plugins
  • Geomys, a blueprint for a sustainable open source maintenance firm
  • XAES-256-GCM

Graham Cluley

  • Free decryptor for victims of Phobos ransomware released
  • Smashing Security podcast #427: When 2G attacks, and a romantic road trip goes wrong
  • UK to ban public sector from paying ransomware demands
  • The AI Fix #60: Elon’s AI girlfriend, the arsonist red panda, and the AI that …
  • Europol targets Kremlin-backed cybercrime gang NoName057(16)
  • Loaf and order: Belgian police launch bread-based cybersecurity campaign
  • Smashing Security podcast #426: Choo Choo Choose to ignore the vulnerability
  • Police dismantle DiskStation ransomware gang targeting NAS devices, arrest suspected ringleader
  • The AI Fix #59: Grok thinks it’s Mecha Hitler, and AIs can think strategically
  • SIM scammer’s sentence increased to 12 years, after failing to pay back victim $20 million

Krebs on Security

  • Phishers Target Aviation Execs to Scam Customers
  • Microsoft Fix Targets Attacks on SharePoint Zero-Day
  • Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
  • DOGE Denizen Marko Elez Leaked API Key for xAI
  • UK Arrests Four in ‘Scattered Spider’ Ransom Group
  • Microsoft Patch Tuesday, July 2025 Edition
  • Big Tech’s Mixed Response to U.S. Treasury Sanctions
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
  • Patch Tuesday, June 2025 Edition

Lenny Zeltser

  • How Security and Privacy Teams Break Barriers Together
  • The CISO’s Mindset for 2025: Outcomes, Automation, and Leadership
  • What to Do With Products Without SSO?
  • Transform the Defender’s Dilemma into the Defender’s Advantage
  • Are CISOs of Security Vendors in Your Community?
  • How to Write Good Incident Response Reports
  • My Story So Far and Your Own Career Journey
  • 3 Opportunities for Cybersecurity Leaders Who Choose to Stay
  • Distribute Cybersecurity Tasks with Diffusion of Responsibility in Mind
  • How Security Can Better Support Software Engineering Teams

The MPC Lounge

  • 5th Bar-Ilan Winter School 2015: Advances in Practical Multiparty Computation
  • Publicly Auditable Secure Multiparty Computation
  • Faster Maliciously Secure Two-Party Computation Using the GPU
  • Adapt, adapt, adapt
  • MiniTrix for MiniMacs
  • Categorizing MPC
  • Communication-Efficient MPC for General Adversary Structures
  • Fair enough
  • How to use bitcoin to design fair protocols
  • Round-efficient black-box constructions of composable multi-party computation

Root Labs rdist

  • Rebooting
  • In Which You Get a Chance to Save Democracy
  • Was the past better than now?
  • Thought experiment on protocols and noise
  • Timing-safe memcmp and API parity
  • In Defense of JavaScript Crypto

Russ McRee

  • Moving blog to HolisticInfoSec.io
  • toolsmith #133 - Anomaly Detection & Threat Hunting with Anomalize
  • toolsmith #132 - The HELK vs APTSimulator - Part 2
  • toolsmith #131 - The HELK vs APTSimulator - Part 1
  • toolsmith #130 - OSINT with Buscador
  • toolsmith #129 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 2
  • McRee added to ISSA's Honor Roll for Lifetime Achievement
  • toolsmith #128 - DFIR Redefined: Deeper Functionality for Investigators with R - Part 1
  • Toolsmith Tidbit: Windows Auditing with WINspect
  • Toolsmith Release Advisory: Magic Unicorn v2.8

Schneier on Security

  • Friday Squid Blogging: Stable Quasi-Isodynamic Designs
  • Subliminal Learning in AIs
  • How Solid Protocol Restores Digital Agency
  • Google Sues the Badbox Botnet Operators
  • “Encryption Backdoors and the Fourth Amendment”
  • Another Supply Chain Vulnerability
  • Friday Squid Blogging: The Giant Squid Nebula
  • New Mobile Phone Forensics Tool
  • Security Vulnerabilities in ICEBlock
  • Hacking Trains

Shtetl-Optimized

  • BusyBeaver(6) is really quite large
  • Raymond Laflamme (1960-2025)
  • Trump and Iran, by popular request
  • Guess I’m A Rationalist Now
  • “If Anyone Builds It, Everyone Dies”
  • Cracking the Top Fifty!
  • Opposing SB37
  • Quantum! AI! Everything but Trump!
  • Fight Fiercely
  • I speak at Harvard as it faces its biggest crisis since 1636

Troy Hunt

  • 11 Years of Microsoft Regional Director and 15 Years of MVP
  • Good Riddance Teespring, Hello Fourthwall
  • Weekly Update 461
  • Welcoming Aura to Have I Been Pwned's Partner Program
  • Weekly Update 460
  • Welcoming Push Security to Have I Been Pwned's Partner Program
  • Weekly Update 459
  • Welcoming Truyu to Have I Been Pwned's Partner Program
  • Weekly Update 458
  • Weekly Update 457

Xavier Mertens

  • Hack.lu 2023 Wrap-Up
  • [SANS ISC] macOS: Who’s Behind This Network Connection?
  • [SANS ISC] Python Malware Using Postgresql for C2 Communications
  • [SANS ISC] More Exotic Excel Files Dropping AgentTesla
  • [SANS ISC] Have You Ever Heard of the Fernet Encryption Algorithm?
  • [SANS ISC] Quick Malware Triage With Inotify Tools
  • [SANS ISC] From a Zalando Phishing to a RAT
  • [SANS ISC] Show me All Your Windows!
  • [SANS ISC] Are Leaked Credentials Dumps Used by Attackers?
  • [SANS ISC] Do Attackers Pay More Attention to IPv6?

Sec Ops

Checkpoint

  • Proactive Security for MSPs: 4 Steps to Reduce Risk and Improve Margins
  • Stopping Ransomware: How a Hybrid Mesh Architecture Disrupts the Attack Chain Part Three
  • Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target
  • SharePoint Zero-Day CVE-2025-53770 Actively Exploited: What Security Teams Need to Know
  • Independent Tests Prove It: Check Point’s SASE Excels in Security & User Experience
  • Employee Spotlight: Getting to Know Sandy Venkataraman
  • Global Cyber Attacks Surge 21% in Q2 2025 — Europe Experiences the Highest Increase of …
  • Introducing Check Point Quantum Spark 2500: Smarter Security, Faster Connectivity, and Simpler MSP Management
  • FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild
  • From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture …

Cloudflare

  • The White House AI Action Plan: a new chapter in U.S. AI policy
  • Serverless Statusphere: a walk through building serverless ATProto applications on Cloudflare’s Developer Platform
  • Building Jetflow: a framework for flexible, performant data pipelines at Cloudflare
  • Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770
  • Shutdown season: the Q2 2025 Internet disruption summary
  • Quicksilver v2: evolution of a globally distributed key-value store (Part 2)
  • Explore your Cloudflare data with Python notebooks, powered by marimo
  • Cloudflare 1.1.1.1 incident on July 14, 2025
  • Cloudflare recognized as a Visionary in 2025 Gartner® Magic Quadrant™ for SASE Platforms
  • Hyper-volumetric DDoS attacks skyrocket: Cloudflare’s 2025 Q2 DDoS threat report

Google Online Security Blog

  • Introducing OSS Rebuild: Open Source, Rebuilt to Last
  • Advancing Protection in Chrome on Android
  • Mitigating prompt injection attacks with a layered defense strategy
  • Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store
  • Tracking the Cost of Quantum Factoring
  • What’s New in Android Security and Privacy in 2025
  • Advanced Protection: Google’s Strongest Security for Mobile Devices
  • Using AI to stop tech support scams in Chrome
  • Google announces Sec-Gemini v1, a new experimental cybersecurity model
  • Taming the Wild West of ML: Practical Model Signing with Sigstore

Have I Been Owned

  • Creams Cafe - 159,652 breached accounts
  • MaReads - 74,453 breached accounts
  • Omnicuris - 215,298 breached accounts
  • Catwatchful - 61,641 breached accounts
  • Robinsons Malls - 195,597 breached accounts
  • Have Fun Teaching - 27,126 breached accounts
  • Ualabee - 472,296 breached accounts
  • WiredBucks - 918,529 breached accounts
  • Disk Union - 690,667 breached accounts
  • ColoCrossing - 7,183 breached accounts

Kaspersky

  • Hijacking Discord invite links to install malware | Kaspersky official blog
  • How to protect yourself from Google Forms scams | Kaspersky official blog
  • How to set up security and privacy in Garmin apps | Kaspersky official blog
  • Common mistakes in using CVSS | Kaspersky official blog
  • Update Microsoft SharePoint ASAP | Kaspersky official blog
  • HR guidelines phishing email | Kaspersky official blog
  • What is Wi-Fi sensing, and how does it detect human motion in the home? | …
  • How to protect your router from being hacked and becoming a residential proxy | Kaspersky …
  • What you need to know about CVSS to protect your IT assets
  • Defendnot: fake antivirus software to disable Microsoft Defender

Reddit: /r/netsec

  • r/netsec monthly discussion & tool thread
  • /r/netsec's Q3 2025 Information Security Hiring Thread
  • Created a Penetration Testing Guide to Help the Community, Feedback Welcome!
  • Deepfakes, Vishing, and GPT Scams: Phishing Just Levelled Up
  • The average ransomware attack payment increased nearly 500% from 2023 to 2024.
  • How We Gained Full Access to a $100M Zero-Trust Startup
  • How we Rooted Copilot
  • Admin Emails & Passwords Exposed via HTTP Method Change
  • CastleLoader Malware: Fake GitHub and Phishing Attack Hits 469 Devices
  • SharePoint ToolShell – One Request PreAuth RCE Chain

Reddit: /r/pwned

  • May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
  • Britain’s Companies Are Being Hacked
  • Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
  • Data breaches you might have missed this month
  • Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data …
  • Has TradingView ever experienced any data breaches?
  • 1 Million Accounts Impacted by the Massive 2023 Glamira Data Breach, 875,000 Emails Exposed
  • Anna Jaques Hospital ransomware breach exposed data of 300K patients
  • Hot Topic Breach Confirmed, Millions of Credit Cards Exposed
  • UnitedHealth breach leaks info on over 100M people. Including medical records.

Search Security

  • 11 IoT security challenges and how to overcome them
  • How extortionware, cyberextortion and ransomware differ
  • What is a CISO (chief information security officer)?
  • What is biometric authentication?
  • Incident response tabletop exercises: Guide and template
  • Phishing prevention: How to spot, stop and respond to scams
  • What is a message authentication code (MAC)? How it works and best practices
  • What is SIEM (security information and event management)?
  • What is the principle of least privilege (POLP)?
  • What is phishing? Understanding enterprise phishing threats

Shodan

  • 5 Free Things for Everybody
  • Deep Dive: Malware Hunter
  • Deep Dive: http.favicon
  • Changelog: www.shodan.io
  • Developer Access to Shodan Trends
  • Accepting Crypto: A Vendor Perspective
  • Historical IP Information
  • nrich: A Tool for Fast IP enrichment
  • Introducing Data Feeds for Search Results
  • Introducing the InternetDB API

Tenable

  • Cybersecurity Snapshot: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan
  • Narrowing the Focus: Enhancements to Tenable VPR and How It Compares to Other Prioritization Models
  • Tackling Shadow AI in Cloud Workloads
  • Forrester Names Tenable a Leader in the Q3 2025 Unified Vulnerability Management Solutions Wave™ Report
  • How Exposure Management Can Turn a Torrent of Data into Insight
  • CVE-2025-53770: Frequently Asked Questions About Zero-Day SharePoint Vulnerability Exploitation
  • CVE-2025-54309: CrushFTP Zero-Day Vulnerability Exploited In The Wild
  • Cybersecurity Snapshot: AI Security Tools Embraced by Cyber Teams, Survey Finds, as Vulnerability Research Gets …
  • OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
  • Oracle July 2025 Critical Patch Update Addresses 165 CVEs

Threatpost

  • Student Loan Breach Exposes 2.5M Records
  • Watering Hole Attacks Push ScanBox Keylogger
  • Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
  • Ransomware Attacks are on the Rise
  • Cybercriminals Are Selling Access to Chinese Surveillance Cameras
  • Twitter Whistleblower Complaint: The TL;DR Version
  • Firewall Bug Under Active Attack Triggers CISA Warning
  • Fake Reservation Links Prey on Weary Travelers
  • iPhone Users Urged to Update to Patch 2 Zero-Days
  • Google Patches Chrome’s Fifth Zero-Day of the Year

Trip Wire

  • The Bullseye on Banks: Why Financial Services Remain a Prime Target for Cyberattacks
  • SaaS Security in 2025: Why Visibility, Integrity, and Configuration Control Matter More Than Ever
  • Why Agentic Security Doesn’t Mean Letting Go of Control
  • Out-of-Band Update: Tripwire Enterprise 9.3.1
  • Does Your Organization Need Deepfake Defenses?
  • Securing Against Phishing Beyond Email
  • Why Financial Websites Should Treat Web Application Firewalls Like Insurance
  • Aligning Software Security Practices with the EU CRA Requirements
  • OT Security in Ports: Lessons from the Coast Guard's Latest Warning
  • 5 Critical Security Risks Facing COBOL Mainframes

Trusted Sec

  • Why is this Finding on my Pentest Report?
  • Hiding in the Shadows: Covert Tunnels via QEMU Virtualization
  • HIPAA, HITECH, and HITRUST - It’s HI Time to Make Sense of it All
  • Azure's Front Door WAF WTF: IP Restriction Bypass
  • CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe
  • Abusing Chrome Remote Desktop on Red Team Operations: A Practical Guide
  • NIST CSF 2.0 Ratings and Assessment Methodologies for Scorecards – When the Math isn’t “Mathing”
  • Attacking JWT using X509 Certificates
  • Dragging Secrets Out of Chrome: NTLM Hash Leaks via File URLs
  • Hunting Deserialization Vulnerabilities With Claude

App Sec

Checkmarx

  • Kudos to the Unsung Heroes in our Current Times: Software Developers
  • Deliver Secure Software from Home: Checkmarx Offers Free 45-Day Codebashing Trial
  • Why “Shift Left” in DevOps is really “Shift Center”
  • Recommendations for Friends and Family on Staying Cyber Safe While Working Remotely
  • A Message From Our CEO: Checkmarx’s Acquisition & The Road Ahead
  • Discussing AppSec Policies within DevSecOps
  • RSA Conference 2020 Wrap-Up: From Software Security to SoulCycle
  • Free your Developers from Mundane Tasks
  • Checkmarx Research: Smart Vacuum Security Flaws May Leave Users Exposed
  • Checkmarx Research: Apache Dubbo 2.7.3 – Unauthenticated RCE via Deserialization of Untrusted Data (CVE-2019-17564)

iSec Partners

  • Introducing opinel: Scout2's favorite tool
  • IAM user management strategy (part 2)
  • iSEC audit of MediaWiki
  • Work daily with enforced MFA-protected API access
  • Use and enforce Multi-Factor Authentication
  • iSEC reviews SecureDrop
  • Recognizing and Preventing TOCTOU Whitepaper
  • IAM user management strategy
  • Do not use your AWS root account
  • Announcing the AWS blog post series

NCC Group Crypto Services

  • Implementing Optimized Cryptography for Embedded Systems
  • Fast and Secure Implementations of the Falcon Post-Quantum Cryptography Signature Algorithm
  • The Longest Blockchain is not the Strongest Blockchain
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
  • Bitcoin Orphan Transactions and CVE-2012-3789
  • Undefined Behavior Is Really Undefined
  • Ethereum Top 10 Security Vulnerabilities For Smart Contracts
  • Confidential Transactions from Basic Principles
  • New Practical Attacks on 64-bit Block Ciphers (3DES, Blowfish)
  • What are State-sized adversaries doing to spy on us? Or how to backdoor Diffie-Hellman

Offensive Security

  • CVE-2025-27136 – LocalS3 CreateBucketConfiguration Endpoint XXE Injection
  • How OffSec Certifications Help You Hire With Confidence
  • CVE-2024-12029 – InvokeAI Deserialization of Untrusted Data vulnerability
  • What is Phishing? Introduction to Phishing Demo (for Beginners)
  • CVE-2025-27636 – Remote Code Execution in Apache Camel via Case-Sensitive Header Filtering Bypass
  • CVE-2025-29306 – Unauthenticated Remote Code Execution in FoxCMS v1.2.5 via Unserialize Injection
  • CVE-2024-39914 – Unauthenticated Command Injection in FOG Project’s export.php
  • What It Really Means to “Try Harder”
  • CVE-2025-3248 – Unauthenticated Remote Code Execution in Langflow via Insecure Python exec Usage
  • CVE-2024-21683 – Authenticated RCE via “Add a New Language” in Atlassian Confluence

The Hacker News

  • U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm
  • Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files
  • Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
  • Overcoming Risks from Chinese GenAI Tool Usage
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments
  • CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing
  • Sophos and SonicWall Patch Critical RCE Flaws Affecting Firewalls and SMA 100 Devices
  • Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and …

Sysadmin

AWS Blog

  • AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, …
  • Simplify serverless development with console to IDE and remote debugging for AWS Lambda
  • AWS AI League: Learn, innovate, and compete in our new ultimate AI showdown
  • Accelerate safe software releases with new built-in blue/green deployments in Amazon ECS
  • Top announcements of the AWS Summit in New York, 2025
  • Announcing Amazon Nova customization in Amazon SageMaker AI
  • Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any scale (preview)
  • Streamline the path from data to insights with new Amazon SageMaker Catalog capabilities
  • AWS Free Tier update: New customers can get started and explore AWS with up to …
  • Monitor and debug event-driven applications with new Amazon EventBridge logging

Cyberciti

  • Download of the day: GIMP 3.0 is FINALLY Here!
  • Ubuntu to Explore Rust-Based “uutils” as Potential GNU Core Utilities Replacement
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems
  • ZFS Raidz Expansion Finally, Here in version 2.3.0
  • lnav – Awesome terminal log file viewer for Linux and Unix
  • sttr – Awesome Linux & Unix tool for transformation of the string
  • How to block AI Crawler Bots using robots.txt file
  • Debian Linux 12.1 released with Security Updates
  • Setting up VSCode for Ansible Lightspeed AI in Ubuntu 22.04 desktop
  • How to upgrade FreeBSD 13.1 to 13.2 release

Netflix Techblog

  • Behind the Streams: Live at Netflix. Part 1
  • Netflix Tudum Architecture: from CQRS with Kafka to CQRS with RAW Hollow
  • Driving Content Delivery Efficiency Through Classifying Cache Misses
  • AV1 @ Scale: Film Grain Synthesis, The Awakening
  • Model Once, Represent Everywhere: UDA (Unified Data Architecture) at Netflix
  • FM-Intent: Predicting User Session Intent with Hierarchical Multi-Task Learning
  • Behind the Scenes: Building a Robust Ads Event Processing Pipeline
  • Measuring Dialogue Intelligibility for Netflix Content
  • How Netflix Accurately Attributes eBPF Flow Logs
  • Globalizing Productions with Netflix’s Media Production Suite

Reddit: /r/linux

  • The EU is trying to implement a plan to use AI to scan and report …
  • EU is proposing a new mass surveillance law and they are asking the public for …
  • Linux 6.16 Released
  • Well, Linus released Linux Kernel 6.16 ...get it and have fun!
  • Linux 6.16 is available today in Fedora Rawhide
  • Open-Source AI in New US Policy: What This Means for Linux
  • Finally Ditched MacOS
  • I am currently creating my own WindowManager/WaylandCompositor
  • [Fedora 42 GNOME] Created a simple program/service that automatically swaps the GDM greeter (the login …
  • finally got linux installed on this computer...yay

Reddit: /r/linuxadmin

  • Microsoft admits it 'cannot guarantee' data sovereignty -- "Under oath in French Senate, exec says …
  • How to see and manage all task created in a server?
  • You can finally run Doom and other graphical apps in Android's Linux Terminal -- "The …
  • System Administrator Appreciation Day
  • Hardware-encrypting drives test suite -- "We conduct a systematic security study of 24 TCG Opal-compliant …
  • For those who run Fedora as a server (versus CentOS/Alma/Rocky), why?
  • My opinion on text editors
  • I have a question about PAM authentication via Linux Servers
  • Feedback on My BIND9 DNS Server Configuration
  • Relax-and-Recover - Recovery ISO Boot Error: default.conf Not Found – Help Needed

Reddit: /r/sysadmin

  • What to do when the client doesn't help
  • Help with Cisco Switch
  • When are SMS and voice call MFA methods being deprecated?
  • Small group NAS suggestions
  • How do you install DirectX on Windows Server 2022
  • A much faster method of bare metal Windows Server installs, using Linux
  • have you ever had an end user submit a ticket written by AI?
  • Am I overreacting?
  • iSCSI connection to IBM storage DS3524
  • Remote work headset

Reddit: /r/homelab

  • MINISFORUM MS-01-S1260 Mini PC Review and Question
  • 6GHz access point(s)
  • Eaton UPS Output Issues
  • DIY NAS….Advise pls
  • Theoretical design I made for fun, don't take it too seriously lol ;p
  • Cheap homelab options up to €70
  • Are there any services that you could very easily run on your Compute, but choose …
  • Home Lab Equipment Advice
  • How to Start (for education's sake)?
  • adding more hard-drive to a psu?

Stack Exchange: Security

  • Why not use the "age" tool for encrypted backups?
  • Can I get access into my dads phone without the password and icloud info? [closed]
  • What are the real-world cryptographic implications if P=NP is proven constructively?
  • Can I skip verifying server CA in mTLS if I don't need request confidentiality nor …
  • Kerberos: How to validate PKINIT is functioning? [migrated]
  • The security of HSM keys and various scenarios, Is iCloud Permanently Deleted Data Safe with …
  • Sites flagged by Virustotal - need url examples
  • Testing for Broken Object Level Authorization (BOLA) vulnerabilities
  • How often should one order a pentest?
  • Decrypt SSL with Wireshark supported browsers

Tech News

Ars Technica

  • After BlackSuit is taken down, new ransomware group Chaos emerges
  • OpenAI’s most capable AI model, GPT-5, may be coming in August
  • Supply-chain attacks on open source software are getting out of hand
  • Two major AI coding tools wiped out user data after making cascading mistakes
  • Nvidia AI chips worth $1B smuggled to China after Trump export controls
  • Some VMware perpetual license owners are unable to download security patches
  • White House unveils sweeping plan to “win” global AI race through deregulation
  • OpenAI and partners are building a massive AI data center in Texas
  • What to know about ToolShell, the SharePoint threat under mass exploitation
  • A power utility is reporting suspected pot growers to cops. EFF says that’s illegal.

Tech Crunch

  • Top 10 AI Tools That Will Transform Your Content Creation in 2025
  • LimeWire AI Studio Review 2023: Details, Pricing & Features
  • Top 10 AI Tools in 2023 That Will Make Your Life Easier
  • Top 10 AI Content Generator & Writer Tools in 2022
  • Beginner Guide to CJ Affiliate (Commission Junction) in 2022
  • TOP 11 AI MARKETING TOOLS YOU SHOULD USE (Updated 2022)
  • Most Frequently Asked Questions About Affiliate Marketing
  • What is Blockchain: Everything You Need to Know (2022)
  • ProWritingAid VS Grammarly: Which Grammar Checker is Better in (2022) ?
  • Sellfy Review 2022: How Good Is This Ecommerce Platform?

The Verge

  • The Fujifilm X-E5 proves familiar isn’t always a bad thing
  • The Verge’s 2025 back-to-school shopping guide
  • Apple beta season is here
  • Here are the laptops I’d tell any parent to consider for their back-to-school student
  • Online MAGA cope is now Congressional strategy
  • The Drifter is a good old-fashioned thriller
  • OnePlus Nord 5 review: selfie-centric midranger
  • Inside the struggle to create a cozy Lord of the Rings game
  • GPD’s monster Strix Halo handheld requires a battery ‘backpack’ or a 180W charger
  • DJI couldn’t confirm or deny it disguised this drone to evade a US ban

AnandTech

  • End of the Road: An AnandTech Farewell
  • The Corsair iCUE LINK TITAN 360 RX RGB AIO Cooler Review: Meticulous, But Pricey
  • The iBUYPOWER AW4 360 AIO Cooler Review: A Good First Effort
  • The Cougar Poseidon Ultra 360 ARGB AIO Cooler Review: Bright Lights, Average Cooling
  • Sabrent Rocket nano V2 External SSD Review: Phison U18 in a Solid Offering
  • The Endorfy Fortis 5 Dual Fan CPU Cooler Review: Towering Value
  • ACEMAGIC F2A 125H SFF PC Review: Mid-Range Meteor Lake at 65W
  • MediaTek to Add NVIDIA G-Sync Support to Monitor Scalers, Make G-Sync Displays More Accessible
  • Qualcomm Adds Snapdragon 7s Gen 3: Mid-Tier Snapdragon Gets Cortex-A720 Treatment
  • CXL Gathers Momentum at FMS 2024
  • Back to top
  • RSS
  • GitHub