13 clever APIs for capturing every kind of data
infoworld.com·21h
🔍Search Algorithms
Privacy Protection: Encrypted DNS
rajhackingarticles.blogspot.com·4d·
🛡️Security Type Systems
How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
tenable.com·17h
🛡️Capability Security
5 Tips I Wish I Knew Earlier as a Security Architect
dev.to·1d·
Discuss: DEV
🛡️Capability Security
Detecting Distillation Data from Reasoning Models
arxiv.org·2h
Type Checking
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.biz·1d
🏷️Memory Tagging
A First Look at the Lifecycle of DL-Specific Self-Admitted Technical Debt
arxiv.org·2h
📊Code Metrics
The Counterfactual Quiet AGI Timeline
lesswrong.com·1d
🏰Capability Machines
Show HN: A minimal VPN implementation written in Go
github.com·20h·
Discuss: Hacker News
📡Network Serialization
Keeping Scammers Away from Your System
dev.to·4d·
Discuss: DEV
🛡️Security Type Systems
Chat Control is "like a malware on your device" – Signal slams the EU proposal to scan your private chats
techradar.com·21h·
Discuss: r/privacy
🛡️Security Type Systems
The Secure Network Automation Playbook: Using Ansible, Python, and GitOps for Security
dev.to·2d·
Discuss: DEV
Configuration Validation
Active Directory Security Tip #12: Kerberos Delegation
adsecurity.org·6h
🛡️Security Type Systems
🧠 “Data Formats: The Avengers of Analytics” (And Who’s the Real Hero?)
dev.to·16h·
Discuss: DEV
🔢Binary Formats
SDQ-LLM: Sigma-Delta Quantization for 1-bit LLMs of any size
reddit.com·3h·
Discuss: r/LocalLLaMA
📏Linear Memory
How we trained an ML model to detect DLL hijacking
securelist.com·22h
🏷️Memory Tagging
Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
isc.sans.edu·1d
🛡️Parser Security
Safe and Compliant Cross-Market Trade Execution via Constrained RL and Zero-Knowledge Audits
arxiv.org·2h
📮Message Queues