Perspectives on Public Space: A Reading List
daily.jstor.org·9h
📺Media
Flag this post
2025 Component Abuse Challenge: Relay Used As Guitar Pickup
hackaday.com·3h
📱Apple
Flag this post
The Monks in the Casino
📺Media
Flag this post
Monitoring Students’ Chatbot Conversations Is Big Business Now
gizmodo.com·3d
🔍Osint
Flag this post
Digital Omnibus Leaked Proposals
zylstra.org·1d
📺Media
Flag this post
The Ultimate Guide to Continuous Threat Exposure Management (CTEM)
vmray.com·3d
🔍Osint
Flag this post
The Shift from Computation to Conversation
📺Media
Flag this post
10 Thursday AM Reads
ritholtz.com·11h
📺Media
Flag this post
NHS supplier ends probe into ransomware attack that contributed to patient death
theregister.com·11h
🔬Digital Forensics
Flag this post
RCOAST Named Winner of the QBE AcceliCITY Resilience Challenge
prnewswire.com·3h
📱Apple
Flag this post
AI agents open door to new hacking threats
techxplore.com·2d
🔍Osint
Flag this post
Shiji Group Redefines Hotel Dining with AI-Driven F&B Technology and Empathy-First Design
prnewswire.com·1d
🔍Osint
Flag this post
Managing GenAI Risk In Police Investigations
forensicfocus.com·2d
🔬Digital Forensics
Flag this post
In defense of pleasure: We need to rethink food reward and obesity
journals.plos.org·9h
📺Media
Flag this post
RAG-targeted Adversarial Attack on LLM-based Threat Detection and Mitigation Framework
arxiv.org·2d
🔍Osint
Flag this post
Exclusive | Chinese Hackers Used Anthropic’s AI to Automate Cyberattacks - The Wall Street Journal
news.google.com·6h
🔍Osint
Flag this post
Exclusive | Chinese Hackers Used Anthropic’s AI to Automate Cyberattacks - The Wall Street Journal
news.google.com·6h
🔍Osint
Flag this post
Loading...Loading more...