How to complete A Reveal in Ruins in Arc Raiders
pcgamer.com·1d
🚪Escape Rooms
Flag this post
Alternate to Chainguard libraries for Python
edu.chainguard.dev·18h·
Discuss: r/devops
Code Golf
Flag this post
How I Leverage LLMs
indiethinkers.com·1d·
Discuss: Hacker News
Code Golf
Flag this post
The Curious About Everything Newsletter #56
jodiettenberg.substack.com·2d·
Discuss: Substack
🧩Riddles
Flag this post
How I Found the Worst ASP.NET Vulnerability — A $10K Bug (CVE-2025-55315)
praetorian.com·1h
Code Golf
Flag this post
Happy World Digital Preservation Day!
artefactual.com·17h
🏗System design
Flag this post
Cybercrims plant destructive time bomb malware in industrial .NET extensions
theregister.com·1h
Code Golf
Flag this post
Sub-exponential Growth in Online Word Usage: A Piecewise Power-Law Model
arxiv.org·11h
Code Golf
Flag this post
urbanadventurer/Android-PIN-Bruteforce
github.com·1d
🚪Escape Rooms
Flag this post
PCT quantum symmetries -- section
ncatlab.org·1d
🧠Logic Puzzles
Flag this post
The unbearable lightness of getting scammed: Future of full scale cybersecurity
techradar.com·1h
🚪Escape Rooms
Flag this post
Announcing SlopGuard — Open-Source Defence Against AI Supply Chain Attacks
dev.to·5h·
Discuss: DEV
Code Golf
Flag this post
[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting
seclists.org·3h
🧪Testing Philosophy
Flag this post
What data do coding agents send, and where to?
chasersystems.com·3d·
Discuss: Hacker News
Code Golf
Flag this post
Video Game Studios Exploit Legal Rights of Children
blogger.com·1h
🚪Escape Rooms
Flag this post
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
thehackernews.com·44m
💻Tech
Flag this post
AI in App Security: Opportunities and Risks
heise.de·1d
Code Golf
Flag this post
Louvre used its own name as password, according to newly reviewed confidential documents
washingtontimes.com·1d
🧩Riddles
Flag this post
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation Framework
arxiv.org·1d
Code Golf
Flag this post
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)
isc.sans.edu·1d
💻Tech
Flag this post