How to strengthen AI fraud models in payment platforms
fingerprint.comยท1d
๐๏ธSoftware Architecture
Flag this post
NPM supply chain attacks with Charlie Erickson
opensourcesecurity.ioยท2d
๐Hacking
Flag this post
Block 'Em Sock 'Em Beat Battle
sasha.ggยท5h
๐ปProgramming
Flag this post
I logged all the HTTP requests that hit my new web server
lenny.bearblog.devยท3d
๐Hacking
Flag this post
Update 2.29.156 - New Units AWACS, EMP Droid, Uranium Hover Miner, Gatling Gun Solider
noblemaster.itch.ioยท2d
๐Hacking
Flag this post
Distro Hopping, Server Edition
chriswarrick.comยท2d
๐งLinux
Flag this post
Bitcoin Optech Newsletter #379
bitcoinops.orgยท4d
๐๏ธSoftware Architecture
Flag this post
cellwebb/gac v3.0.0
github.comยท1d
๐Hacking
Flag this post
The Replicator in the Garage
jxself.orgยท1d
๐งReverse Engineering
Flag this post
Questioning the Requirements
lesswrong.comยท1d
๐งReverse Engineering
Flag this post
FastAPI Template
๐๏ธSoftware Architecture
Flag this post
Tech With Tim: Is This the Fastest App Build Ever? (Base44 Demo)
๐๏ธSoftware Architecture
Flag this post
BARD10: A New Benchmark Reveals Significance of Bangla Stop-Words in Authorship Attribution
arxiv.orgยท1h
๐ปComputer Science
Flag this post
MX Linux 25: Switch to Debian Trixie Base
heise.deยท18h
๐งLinux
Flag this post
The Battle began
๐๏ธSoftware Architecture
Flag this post
Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)
๐งReverse Engineering
Flag this post
Microsoft Patch Tuesday addresses 63 defects, including one actively exploited zero-day
cyberscoop.comยท9h
๐งLinux
Flag this post
Runtime behind Docker and Kubernetes contains three vulnerabilities
techzine.euยท1d
๐งLinux
Flag this post
Loading...Loading more...