🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
Gizmo8312's Top Finds
Loading...
Subscribe
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Management of IP numbers by peg-DHCP (1998)
datatracker.ietf.org
·
1h
·
Discuss:
Hacker News
Canonical's hiring process is a case study in crapness
tomkranz.com
·
6h
·
Discuss:
Hacker News
🔒
Cyber security
Building Safeguards for Claude
anthropic.com
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Claude is competitive with humans in (some) cyber competitions
red.anthropic.com
·
3d
·
Discuss:
Hacker News
🔒
Cyber security
Sam Altman was wrong: AI didn't defeat auth. Single factors did
stytch.com
·
6h
·
Discuss:
Hacker News
Podcast Episode: Separating AI Hope from AI Hype
eff.org
·
15h
🤖
AI
AI's Security Crisis: Why Your Assistant Might Betray You
lastweekinaws.com
·
7h
·
Discuss:
Hacker News
Understanding Transformers through the Lens of Pavlovian Conditioning
arxiv.org
·
18h
🤖
AI
AI Slop and the Destruction of Knowledge
irisvanrooijcogsci.com
·
12h
·
Discuss:
Hacker News
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
pub.aimind.so
·
9h
·
Discuss:
Hacker News
The GPT-5 Launch Broke the AI Internet (And Not in a Good Way)
docker.com
·
5h
The brink of new AI standard
dev.to
·
2h
·
Discuss:
DEV
🤖
AI
Brains Behind the Code: Learn Hands-On AI Course in Bangalore
dev.to
·
16h
·
Discuss:
DEV
🤖
AI
The Invisible War: How AI Is Already Rewriting the Rules of Cyber Conflict
hackernoon.com
·
2d
🕵
Threat intelligence
First Ask Then Answer: A Framework Design for AI Dialogue Based on Supplementary Questioning with Large Language Models
arxiv.org
·
18h
🤖
AI
The AI That Sees Better Than Us Is Here, And It’S Open Source
dev.to
·
21h
·
Discuss:
DEV
🤖
AI
How AI Is Changing the Game in Phishing Attacks
dev.to
·
5h
·
Discuss:
DEV
🔒
Cyber security
Stationarity Exploration for Multivariate Time Series Forecasting
arxiv.org
·
18h
🤖
AI
AI-First Development: 95% Autonomous Code Generation
dev.to
·
20h
·
Discuss:
DEV
🤖
AI
Automated Vulnerability Prioritization via Knowledge Graph Reasoning & Reinforcement Learning
dev.to
·
1d
·
Discuss:
DEV
🕵
Threat intelligence
Loading...
Loading more...
« Page 2
•
Page 4 »