🦞🌯 Lobster Roll

All LHN/.~Ars
RSS

Showing stories from 2025-09. View all

NewestOldestTop ScoredMost Discussed
LLM security agent finds vulnerability in LLM engineering platform (depthfirst.com)
Android 16 public tags don't match security patch level (issuetracker.google.com)
Mind the encryptionroot: How to save your data when ZFS loses its mind (sambowman.tech)
Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach (zenodo.org)
Zeroday.cloud – the first cloud open-source hacking competition (zeroday.cloud)
Ruby Central's "security measures" leave front door wide open (joel.drapper.me)
Shellshock (2014, 2025) (dwheeler.com)
Claude in Cyber Competitions (red.anthropic.com)
How Deno protects against NPM exploits (deno.com)
Warnings about Cisco vulns under active exploit are falling on deaf ears (theregister.com)
Surreptitious Surveillance (blog.cr.yp.to)
Strengthening NPM security: Important changes to authentication and tokens (github.blog)
Principles of Proactive Cybersecurity (youtube.com)
The UK constitution is more vulnerable than the US constitution (prospectmagazine.co.uk)
VMScape: Exposing and Exploiting Incomplete Branch Predictor Isolation in Cloud (comsec.ethz.ch)
Google CTF 2025 – webz : Exploiting zlib's Huffman Code Table (velog.io)
Cyber attacks: '80%' of ransomware victims pay up, insurer says (news.sky.com)
Private Cloud Compute: A new frontier for AI privacy in the cloud (security.apple.com)
Submarine cable security is all at sea, and UK govt too timid to act says report (theregister.com)
What Is Zero Trust Security? A Simple Guide for Businesses (polygraf.ai)
Tile Tracking Tags Can Be Exploited (wired.com)
Privacy loophole: don't even "Dismiss" the "How is Claude doing this session?" (keydiscussions.com)
Security folks, which would you feel more comfortable with?
Hi all,<p>I work at a SaaS company that needs to securely connect our cloud control plane to customer on-premise infrastructure in order to run orchestration and automation tasks. We’re trying to avoid requiring customers to open inbound firewall rules or stand up full VPNs.<p>We’ve narrowed it down...
Show HN: AirAuth – Modern Authentication for NextJS (github.com)
Learn Kubernetes Security book, second edition just published (amazon.com)
Show HN: DataXLator – Client-Side JSON ↔ YAML Converter (Privacy-First) (kcreed713.github.io)
Hi HN, I&#x27;m launching DataXLator, a utility I built to solve a problem many of us face: needing quick, reliable conversion between JSON and YAML for config files (Kubernetes, Ansible, etc.) without trusting a random server with sensitive data. The core feature is that all free conversions run 10...
Offensive Security After the Price Collapse (medium.com)
Flock Safety says AI surveillance could stop all crime (san.com)
Google Says Android PKVM Earns Highest Level of Security Assurance (securityweek.com)
Let's Encrypt Production ACME API Disruption (status.io)