Write about MTE (Android)
discuss.privacyguides.net·8h
🖥Selfhosting
Flag this post
Cyber attacks usually lead to long-term financial hardship
techzine.eu·23h
🖥Selfhosting
Flag this post
Monday open line
arktimes.com·12h
🖥Selfhosting
Flag this post
Intel files lawsuit against ex-employee who allegedly copied 18,000 company files & disappeared
shacknews.com·6h
👨Programming
Flag this post
A large, paired dataset of robotic and handheld lumbar spine ultrasound with ground-truth CT benchmarking
nature.com·21h
👨Programming
Flag this post
At the Root: An Anti-Racist Ethical Source License for Open Source Projects
attheroot.dev·2d·
Discuss: Hacker News
👨Programming
Flag this post
How can they do this?
aardvark.co.nz·17h
👨Programming
Flag this post
I got an abusive message from an email subscriber — should I let his employer know?
askamanager.org·15h
🖥Selfhosting
Flag this post
Protection against surveillance
discuss.privacyguides.net·1d
🖥Selfhosting
Flag this post
OPSWAT highlights the role of women in advancing cybersecurity across Saudi Arabia
zawya.com·2d
👨Programming
Flag this post
Building Trust in AI: Why Content Detection Should Matter to Developers
medium.com·4h·
Discuss: DEV
👨Programming
Flag this post
The Complete Beginner's Guide to vpcctl: Building Virtual Networks on Linux
dev.to·2h·
Discuss: DEV
🖥Selfhosting
Flag this post
Bounteous Named to 2025 IDC FinTech Rankings Top 100 for Third Consecutive Year
prnewswire.com·2h
👨Programming
Flag this post
5 ways AI is supercharging DDoS attacks
techradar.com·27m
👨Programming
Flag this post
Monitoring Autonomous Systems Telemetry: Building an HFT-Grade Network Analysis Pipeline for UDP-based Protocols
dev.to·1d·
Discuss: DEV
🖥Selfhosting
Flag this post
Truth Over Hype: A Builder’s Playbook for Credible Storytelling
dev.to·23h·
Discuss: DEV
🖥Selfhosting
Flag this post
Banning Social Media
nytimes.com·1d
👨Programming
Flag this post
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
dev.to·1d·
Discuss: DEV
🖥Selfhosting
Flag this post
China-linked hackers target U.S. non-profit in long-term espionage campaign
securityaffairs.com·2d
🖥Selfhosting
Flag this post