2B email addresses and 1.3B passwords compromised in multiple data breaches
9to5mac.comΒ·1d
🍳cooking
Flag this post
The AI use case doom loop
insidertrends.substack.comΒ·1dΒ·
Discuss: Substack
πŸ”“open source
Flag this post
AI agents, real results: from assistants to orchestrators in the enterprise
theregister.comΒ·19h
πŸ”“open source
Flag this post
3 open-source, cross-platform security apps that just work
howtogeek.comΒ·1d
πŸ”“open source
Flag this post
Analyzing a NPM Spam Campaign: The Great Indonesian Tea Theft
endorlabs.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“open source
Flag this post
Your weekly reading from Web Directions
webdirections.orgΒ·1d
πŸ”“open source
Flag this post
DeepSeek-OCR: Turning Text into Images for Smarter AI
pub.towardsai.netΒ·23h
πŸ”“open source
Flag this post
Ask HN: Seeking advice on designing a personal document server
news.ycombinator.comΒ·2dΒ·
Discuss: Hacker News
πŸ”“open source
Flag this post
Quantum roundup: Lots of companies announcing new tech
arstechnica.comΒ·2d
πŸ”“open source
Flag this post
Police take down three cybercrime operations in latest round of β€˜whack-a-mole’
techcrunch.comΒ·1d
πŸ”“open source
Flag this post
Omnidirectional type inference for ML: principality any way
arxiv.orgΒ·23h
πŸ”’mathematics
Flag this post
How Artificial Intelligence Is Revolutionizing Cybersecurity
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’mathematics
Flag this post
Lessons from Building a 24/7 Autonomous AI System
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”“open source
Flag this post
Security Researchers at Proton Warn of Massive Credential Exposure
blogger.comΒ·3d
πŸ”“open source
Flag this post
How credentials get stolen in seconds, even with a script-kiddie-level phish
malwarebytes.comΒ·3d
πŸ”“open source
Flag this post
FedeCouple: Fine-Grained Balancing of Global-Generalization and Local-Adaptability in Federated Learning
arxiv.orgΒ·23h
πŸ”“open source
Flag this post
Why it’s time to build dumb applications
nordot.appΒ·1d
πŸ”“open source
Flag this post