Dasharo TrustRoot Ephemeral Key Incident
(news.ycombinator.com)
31.
32.
33.
34.
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
(news.ycombinator.com)
35.
Reverse Engineering a Neural Network's Clever Solution to Binary Addition (2023)
(news.ycombinator.com)
36.
Two Windows vulnerabilities, one a 0-day, are under active exploitation
(arstechnica.com)
37.
Hackers hide behind Tor in exposed Docker API breaches
(bleepingcomputer.com)
38.
Show HN: Lightweight tool for managing Linux virtual machines
(news.ycombinator.com)
39.
How we rooted Copilot
(news.ycombinator.com)
40.
How We Rooted Copilot
(news.ycombinator.com)
41.
XOR_singleheader: Header-only binary fuse and XOR filter library
(news.ycombinator.com)
42.
Hackers exploit a blind spot by hiding malware inside DNS records
(arstechnica.com)
43.
Show HN: BinaryRPC – Lightweight WebSocket-based RPC framework in modern C++
(news.ycombinator.com)
44.
Yamlfmt: An extensible command line tool or library to format YAML files
(news.ycombinator.com)
45.
Show HN: A Language Server Implementation for SystemD Unit Files
(news.ycombinator.com)
46.
Show HN: A DOS-like hobby OS written in Rust and x86 assembly
(news.ycombinator.com)
47.
Peano arithmetic is enough, because Peano arithmetic encodes computation
(news.ycombinator.com)