Привет

Last updated: May 21, 2026 · 09:10 PM EAT ·
  1. Jumping the Gun (idiotking.org)
  2. PoC Exploit Released for Drupal's Critical SQL Injection CVE-2026-9082 (www.cyberkendra.com)
  3. Māori Text-to-Speech Model Spurns Big Tech’s Values (spectrum.ieee.org)
  4. The unbearable blandness of the 2020s (backreaction.blogspot.com)
  5. Bypass UAC (rajhackingarticles.blogspot.com)
  6. Coding agents are giving everyone decision fatigue (stackoverflow.blog)
  7. Open-Source Software Is Starting to Help Robots Think (spectrum.ieee.org)
  8. Longform links: more conscious investors (abnormalreturns.com)
  9. Selective HTTP Proxying in Linux, (Thu, May 21st) (isc.sans.edu)
  10. 2000 Great Songs #1337: I Don't Want To See The Sights (www.jitterywhiteguymusic.com)
  11. Bolt Challenges Nvidia With a Focus on Cutting-Edge Graphics (spectrum.ieee.org)
  12. Google wants to be the interface for the web (manualdousuario.net)
  13. Real photo Postcard of a make-do folk art Horse c. 1920 (dulltooldimbulb.blogspot.com)
  14. The Bug That Shouldn’t Exist…But Still Does Everywhere (systemweakness.com)
  15. Secure Agents: Control Policies in the Harness (systemweakness.com)
  16. Guide to Race Conditions: Types, Exploitation, and Mitigation in APIs (systemweakness.com)
  17. Hacking AI APIs: A Bug Bounty Hunter’s Complete Guide to LLM Vulnerabilities (2026) (systemweakness.com)
  18. Starlink Consistently Loses Billions - IPO Prospectus Revelations (subseacables.blogspot.com)
  19. The Welfare-Productivity Tradeoff in US-China Trade (economistwritingeveryday.com)
  20. Tantalizer 110: Clairvoyance (enigmaticcode.wordpress.com)
  21. What banks are doing with AI (thefinanser.com)
  22. Nine-Year-Old Linux Kernel Flaw CVE-2026-46333 Lets Attackers Steal SSH Keys, Shadow Passwords, and Root Access (www.cyberkendra.com)
  23. ISC Stormcast For Thursday, May 21st, 2026 https://isc.sans.edu/podcastdetail/9940, (Thu, May 21st) (isc.sans.edu)
  24. Getting an old Computer online with Android Ethernet tethering (82mhz.net)
  25. My 1993 Mega STE Retro Battlestation (substack.com) (open.substack.com)
  26. Fuel Costs Are Way Up, But It’s Still Pretty Affordable to Fill Up Your Tank (relative to wages) (economistwritingeveryday.com)
  27. Drupal Patches Highly Critical SQL Injection That Lets Anonymous Attackers Hijack PostgreSQL-Backed Sites (www.cyberkendra.com)
  28. Wednesday links: not knowing the future (abnormalreturns.com)
  29. PinTheft: New Linux Exploit Steals Kernel References to Root Shell (www.cyberkendra.com)
  30. Shooting Stars(1928) (classicfilmandtvcorner.wordpress.com)
  31. PostgreSQL Patches 11 Security Flaws, Including Code Execution and a Sneaky Password-Stealing Timing Attack (www.cyberkendra.com)
  32. Tiktok Disrupts Thai Subsea Cable Industry (subseacables.blogspot.com)
  33. GitHub's Own Codebase Was Breached — A Poisoned VS Code Extension Was All It Took (www.cyberkendra.com)
  34. Seeing Around Corners Using Smartphone-Grade Lidar (spectrum.ieee.org)
  35. Nmap Firewall Scan (rajhackingarticles.blogspot.com)
  36. Some New-Ish Releases, May 2026 Edition (www.jitterywhiteguymusic.com)
  37. My Spouse Gets Me the Best Gifts (insearchofsecrets.com)
  38. Personal finance links: the caregiving penalty (abnormalreturns.com)
  39. Windows Privilege Escalation: SeImpersonate (rajhackingarticles.blogspot.com)
  40. 2000 Great Songs #1336: Tell Me A Story (www.jitterywhiteguymusic.com)
  41. Taiwan’s Disposable Drones Tempt Europe, U.S. (spectrum.ieee.org)
  42. Newspaper Clipping of the Day (strangeco.blogspot.com)
  43. Handmade Handpainted Antique Postcard by Bill. Mailed 1913 (dulltooldimbulb.blogspot.com)
  44. Will Robotics Have a ChatGPT Moment? (spectrum.ieee.org)
  45. Self-Hosted Email That Actually Works: The Ultimate Guide to Digital Sovereignty (thecybersecguru.com)
  46. JWT vs Session Tokens in Spring Boot: A Senior Dev’s Decision Guide (systemweakness.com)
  47. The Tool Is the Door (systemweakness.com)
  48. I audited two AI-generated apps on the same backend. The outcomes weren’t close. (systemweakness.com)
  49. SOC Metrics Explained: The Numbers That Actually Define Security Operations (systemweakness.com)
  50. Understanding CWE-89: Improper Neutralization of Special Elements used in an SQL Command (“SQL… (systemweakness.com)
  51. OverTheWire Bandit Walkthrough — Level 1 → 2 | 30-Day Cybersecurity Learning Journey (Day 2) (systemweakness.com)
  52. Pokemon compression myth (reddit.com) (www.reddit.com)
  53. Are we living through a Sputnik Moment? (thefinanser.com)
  54. Pack your agentic stack in Slack (stackoverflow.blog)
  55. ISC Stormcast For Wednesday, May 20th, 2026 https://isc.sans.edu/podcastdetail/9938, (Wed, May 20th) (isc.sans.edu)
  56. The Importance of Being Idempotent (campedersen.com)
  57. Google I/O 2026 — Here's Everything Google Announced (www.cyberkendra.com)
  58. Tuesday links: the end of securities regulation (abnormalreturns.com)
  59. Microsoft's durabletask Hit by TeamPCP — Your Cloud Keys Were the Target (www.cyberkendra.com)
  60. #716: Q&A: Your Kids Just Inherited $350,000 Each. Now What (affordanything.com)

Built with Python · source