What should I study for advanced embedded?
reddit.comΒ·2hΒ·
Discuss: r/embedded
πŸ”“open source
Flag this post
These are still the most popular passwords around - and surely, we can do better than this as a species
techradar.comΒ·1d
πŸ”“open source
Flag this post
How good is AI at Hacking AD?
blog.vulnetic.aiΒ·10hΒ·
Discuss: Hacker News
πŸ”“open source
Flag this post
LLM side-channel attack could allow snoops to guess what you're talking about
theregister.comΒ·9h
πŸ”“open source
Flag this post
SoK: Systematizing a Decade of Architectural RowHammer Defenses Through the Lens of Streaming Algorithms
arxiv.orgΒ·4h
πŸ”“open source
Flag this post
How Point Cloud to BIM Helps Surveyors Reduce Costs and Save Time
scantobim.onlineΒ·23hΒ·
Discuss: DEV
πŸ”’mathematics
Flag this post
Deep Learning for Molecules and Materials
dmol.pubΒ·23hΒ·
Discuss: Hacker News
πŸ”’mathematics
Flag this post
Cyberattackers are getting more evasive: How can defenders keep up?
siliconrepublic.comΒ·17h
πŸ”“open source
Flag this post
Reimagining cybersecurity in the era of AI and quantum
technologyreview.comΒ·18hΒ·
Discuss: Hacker News
πŸ”“open source
Flag this post
Looking to sell an escrow payment system I built
app.lockva.comΒ·1dΒ·
πŸ”“open source
Flag this post
MT-HuBERT: Self-Supervised Mix-Training for Few-Shot Keyword Spotting in Mixed Speech
arxiv.orgΒ·4h
πŸ”“open source
Flag this post
Security Affairs newsletter Round 549 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.comΒ·1d
πŸ”“open source
Flag this post
6 Ways Phishing Scammers Imitate Real People and Brands
howtogeek.comΒ·16h
πŸ”“open source
Flag this post
Don’t Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches
blog.elcomsoft.comΒ·19h
πŸ”“open source
Flag this post
New Rules Put The Squeeze On Semiconductor Gray Market
semiengineering.comΒ·1h
πŸ”“open source
Flag this post
What if the Answer To Bad Passwords Is More Websites That Won’t Let You Use Them?
vice.comΒ·11h
πŸ”“open source
Flag this post
Network edge design checklist: Part 2 β€” Network edge design
blog.apnic.netΒ·2h
πŸ”“open source
Flag this post
Hardware Wallets Surge as Crypto’s Unyielding Shield Against Cyber Threats
kttc.marketminute.comΒ·1d
πŸ”“open source
Flag this post
TryHackMe: Defensive Security Intro
abefromen.bearblog.devΒ·1d
πŸ”“open source
Flag this post