Cyber attacks usually lead to long-term financial hardship
techzine.euยท20h
๐ฅSelfhosting
Flag this post
A large, paired dataset of robotic and handheld lumbar spine ultrasound with ground-truth CT benchmarking
nature.comยท18h
๐จProgramming
Flag this post
New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond
blog.checkpoint.comยท19h
๐ฅSelfhosting
Flag this post
At the Root: An Anti-Racist Ethical Source License for Open Source Projects
๐จProgramming
Flag this post
How can they do this?
aardvark.co.nzยท14h
๐จProgramming
Flag this post
I got an abusive message from an email subscriber โ should I let his employer know?
askamanager.orgยท12h
๐ฅSelfhosting
Flag this post
An argument for Classic Source Criticism in the Age of Misinformation
dataethics.euยท5h
๐จProgramming
Flag this post
OPSWAT highlights the role of women in advancing cybersecurity across Saudi Arabia
zawya.comยท2d
๐จProgramming
Flag this post
Protection against surveillance
discuss.privacyguides.netยท1d
๐ฅSelfhosting
Flag this post
A verse from the Divine Word of the World Wide Web for you disbelievers
๐จProgramming
Flag this post
THE HOMELAB EXPERIENCE 1 : NAS AND DOCKER
๐ฅSelfhosting
Flag this post
Banning Social Media
nytimes.comยท1d
๐จProgramming
Flag this post
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
๐ฅSelfhosting
Flag this post
China-linked hackers target U.S. non-profit in long-term espionage campaign
securityaffairs.comยท2d
๐ฅSelfhosting
Flag this post
Deception Decoder: Proposing a Human-Focused Framework for Identifying AI-Generated Content on Social Media
arxiv.orgยท2h
๐จProgramming
Flag this post
Alaska Airlines Flight 1282 revealed a deeper problem: Boeing couldn't identify who reinstalled the door plug that blew off mid-flight. The NTSB found no names,...
threadreaderapp.comยท24m
๐ฅSelfhosting
Flag this post
The Washington Post confirms it suffered an Oracle-linked data breach
techradar.comยท17h
๐ฅSelfhosting
Flag this post
Loading...Loading more...