Ask HN: I know how to build it, now I want to break it
news.ycombinator.com·1d·
Discuss: Hacker News
🖥Selfhosting
Flag this post
Head in the Zed Cloud
maxdeviant.com·2h
🖥Selfhosting
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nz·1d
👨Programming
Flag this post
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]
myitbasics.com·13h·
Discuss: DEV
👨Programming
Flag this post
Congressional Budget Office hacked, China suspected in breach
cnn.com·21h·
Discuss: Hacker News
👨Programming
Flag this post
A Security Model for Systemd
lwn.net·3d·
🖥Selfhosting
Flag this post
Kaspersky shares top trends in the financial sector
zawya.com·3d
🖥Selfhosting
Flag this post
This is how I went completely incognito on Windows 11
makeuseof.com·12h
🖥Selfhosting
Flag this post
Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
arxiv.org·4d
👨Programming
Flag this post
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
thehackernews.com·2d
🖥Selfhosting
Flag this post
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
darkreading.com·4d
👨Programming
Flag this post
Cybersecurity Weekly #7: How AI Is Boosting Threat Detection for Freelancers & Small Businesses in 2025
future.forem.com·2d·
Discuss: DEV
🖥Selfhosting
Flag this post
NPM supply chain attacks with Charlie Erickson
opensourcesecurity.io·5h
🖥Selfhosting
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.com·2d
🖥Selfhosting
Flag this post
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
arxiv.org·41m
👨Programming
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.to·20h·
Discuss: DEV
👨Programming
Flag this post
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
dev.to·35m·
Discuss: DEV
🖥Selfhosting
Flag this post
Banning Social Media
nytimes.com·16h
👨Programming
Flag this post
Cybersecurity in the AI Era: It's Not a Feature, It's Genetic Code
dev.to·4d·
Discuss: DEV
👨Programming
Flag this post