News
Latest
Top
Search
Submit
Login
Search
▲
80
Windows ARM64 Internals: Deconstructing Pointer Authentication
(preludesecurity.com)
by todsacerdoti |
view
|
9 comments
▲
5
I Solved Chrome DevTools MCP's Authentication Gap
(claude.ai)
by coderrx |
view
|
2 comments
▲
4
AI Threats Have Broken Strong Authentication
(securityboulevard.com)
by mooreds |
view
|
0 comments
▲
4
A comprehensive method for species identification in meat authentication
(sciencedirect.com)
by PaulHoule |
view
|
0 comments
▲
4
Better authentication with workload identity federation
(tailscale.com)
by tabletcorry |
view
|
0 comments
▲
3
React executes malicious code with malformed HTML–no authentication needed
(arstechnica.com)
by gbourne |
view
|
2 comments
▲
3
H3TAG: The Authentication Layer for the Internet
(h3tag.com)
by nonameuserd |
view
|
0 comments
▲
2
Administrative FortiCloud SSO authentication bypass
(fortiguard.fortinet.com)
by ibobev |
view
|
0 comments
▲
2
Ask HN: When "Two-Factor Authentication" (2FA) Aren't Two
by s3131212 |
view
|
0 comments
▲
2
Beyond RC4 for Windows Authentication
(microsoft.com)
by e12e |
view
|
0 comments
▲
2
Show HN: I built ephemeral authentication – no tokens, just vanishing proofs
(npmjs.com)
by emphreal_tech |
view
|
2 comments
▲
2
Liquid Auth: Decentralized, passwordless Web3 authentication
(algorand.co)
by wslh |
view
|
0 comments
▲
2
Open Source Authentication for AI Agents. OIDC + OAuth 2.1
(github.com)
by hkpatel3 |
view
|
2 comments
▲
2
Strong Authentication in a Post-Quantum World
(kuppingercole.com)
by mooreds |
view
|
0 comments
▲
1
Our AI code reviewer found a CVSS 10.0 authentication bypass in pac4j-JWT
(codeant.ai)
by Amartya_jha |
view
|
1 comments
▲
1
Pocket ID: Easy Passkey Authentication
(runtimeterror.dev)
by todsacerdoti |
view
|
0 comments
▲
1
MachineAuth: Open source Authentication infrastructure for AI agents
(github.com)
by mandarwagh |
view
|
1 comments
▲
1
Critical Authentication Bypass in Pac4j-JWT – Using Only a Public Key
(codeant.ai)
by Brajeshwar |
view
|
0 comments
▲
1
Authentication bypass in pac4j-JWT using only the RSA public key
(codeant.ai)
by Amartya_jha |
view
|
0 comments
▲
1
AI Authentication and Authorization
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
1
Greasing Linux Auth: Hardware-Backed Authentication with PAM+TPM2
(blog.prizrak.me)
by razighter777 |
view
|
1 comments
▲
1
Anonymous Authentication: Creating access tokens for guest accounts
(github.com)
by ffo |
view
|
0 comments
▲
1
Is your Agent secure? OpenAgents' agent ID provides encrypted authentication
(agentpedia.so)
by Cherie91 |
view
|
1 comments
▲
1
Gauging Interest in Offline Authentication
by solarpunked |
view
|
0 comments
▲
1
Honey Fraud as a Moving Analytical Target: Omics-Informed Authentication
(mdpi.com)
by PaulHoule |
view
|
0 comments
▲
1
Conductor removing support for Claude subscription authentication
(twitter.com)
by jrsj |
view
|
0 comments
▲
1
Using Karabiner-Elements for Sudo Authentication via 1Password
(jesse.id)
by jesse_dot_id |
view
|
0 comments
▲
1
Show HN: Seamless Auth – open-source passwordless authentication
(github.com)
by bccorb1000 |
view
|
0 comments
▲
1
Show HN: API authentication assumes the caller decides – agents break that
(github.com)
by theaniketgiri |
view
|
0 comments
▲
1
Weatherman introduces fruit-based authentication system to combat deep fakes
(youtube.com)
by savrajsingh |
view
|
0 comments
▲
1
Should You Build or Buy Authentication?
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
1
Properly securing Open law with authentication
(haproxy.com)
by owenthejumper |
view
|
0 comments
▲
1
Force step up authentication in web applications
(damienbod.com)
by mooreds |
view
|
0 comments
▲
1
Is that allowed? Authentication and authorization in Model Context Protocol
(stackoverflow.blog)
by mooreds |
view
|
0 comments
▲
1
What Is AI Agent Authentication, and Why Does Your Small Business Need It?
(blog.lastpass.com)
by mooreds |
view
|
0 comments
▲
1
Amazone One palm authentication discontinued
(amazonone.aws.com)
by KerryJones |
view
|
0 comments
▲
1
Amazon One palm authentication services ending June 3, 2026
(amazonone.aws.com)
by stepquiet |
view
|
1 comments
▲
1
CVE-2026-23993: JWT authentication bypass in HarbourJwt via "unknown alg"
(pentesterlab.com)
by lovedhacker |
view
|
0 comments
▲
1
JWT authentication bypass in HarbourJwt via "unknown alg"
(pentesterlab.com)
by mooreds |
view
|
0 comments
▲
1
Is that allowed? Authentication and authorization in Model Context Protocol
(stackoverflow.blog)
by mooreds |
view
|
0 comments
▲
1
Designing an Authentication System: A Dialogue in Four Scenes (1997)
(web.mit.edu)
by vismit2000 |
view
|
0 comments
▲
1
GNU InetUtils Security Advisory: remote authentication by-pass in telnetd
(openwall.com)
by blincoln |
view
|
0 comments
▲
1
Galileo Navigation Message Authentication looking forward
(insidegnss.com)
by Harvesterify |
view
|
0 comments
▲
1
Is that allowed? Authentication and authorization in Model Context Protocol
(stackoverflow.blog)
by mooreds |
view
|
0 comments
▲
1
Remote authentication by-pass in inetutils-telnetd
(openwall.com)
by s3krit |
view
|
0 comments
▲
1
Remote Authentication By-Pass in Telnetd
(seclists.org)
by faebi |
view
|
0 comments
▲
1
GNU InetUtils Security Advisory: remote authentication by-pass in telnetd
(seclists.org)
by DyslexicAtheist |
view
|
0 comments
▲
1
GNU InetUtils Security Advisory: remote authentication by-pass in telnetd
(openwall.com)
by jwilk |
view
|
0 comments
▲
1
Auth Bottleneck Architecture – Streamline Authentication Across Applications
(fusionauth.io)
by mooreds |
view
|
0 comments
▲
1
Web Authentication: An API for Accessing Public Key Credentials – Level 3
(w3.org)
by joecobb |
view
|
0 comments