Auditing JDBC Drivers at Scale with AI led to 85000 bounty
hacktron.ai·1d·
Discuss: Hacker News
🛡️Parser Security
Flag this post
Building a High-Performance Live Network Sniffer in Rust (Without Kernel Drivers)
dev.to·13h·
Discuss: DEV
⚙️TOML Parsers
Flag this post
Beyond the Changelog: Engineering Your Blog for B2B Thought Leadership
getmichaelai.com·20h·
Discuss: DEV
🎮Language Ergonomics
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·18h
🔒Rust Borrowing
Flag this post
No Deus ex Machina
thestoicprogrammer.substack.com·23h·
Discuss: Substack
📚Forth Compilers
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.pro·1d·
Discuss: Hacker News
📡Protocol Parsers
Flag this post
October 2024 Progress in Guaranteed Safe AI
lesswrong.com·2d
📈Monotonic Logic
Flag this post
on extracting wechat database encryption keys (macos edition)
mgx.bearblog.dev·11h
🏷️Memory Tagging
Flag this post
GlobalLogic Moves to Protect Workforce After Oracle-Related Data Theft
blogger.com·17h
🔐Security Types
Flag this post
Taming the Data Beast: Build Pipelines That Bend, Not Break by Arvind Sundararajan
dev.to·23h·
Discuss: DEV
📋JSON Parsing
Flag this post
A forthcoming problem with bitvm - Supertestnet interrogates Citrea's protocol
telegra.ph·1d
🔢Bit Manipulation
Flag this post
Automated Regulatory Compliance Risk Assessment via Multi-Modal Knowledge Graph Fusion & Explainable AI
dev.to·1d·
Discuss: DEV
📊DataFrame Types
Flag this post
Industries Where Your C Code Saves Lives (And They're Hiring)
dev.to·3h·
Discuss: DEV
🔌Microcontrollers
Flag this post
Why GRC Programs Fail Without Continuous Cyber Risk Intelligence
securityscorecard.com·1d
🛡️Security Type Systems
Flag this post
Use OpenTelemetry with Observability Pipelines for vendor-neutral log collection and cost control
datadoghq.com·3d
📊Log Parsers
Flag this post
Utilize another telemetry data for faster improvement with AI agent
dev.to·1d·
Discuss: DEV
📊Profilers
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🛡️Parser Security
Flag this post
Building a DDoS Attack Simulator to Understand Defense Strategies
devops-daily.com·1d·
Discuss: DEV
🌍HTTP Servers
Flag this post