Patchday: Critical malicious code vulnerability in Android 13, 14, 15, 16 closed
heise.deยท4h
๐๏ธDesign Patterns
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.netยท1d
๐๏ธDesign Patterns
Flag this post
Security Affairs newsletter Round 548 by Pierluigi Paganini โ INTERNATIONAL EDITION
securityaffairs.comยท2d
๐ขNumerical Methods
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
๐ฌStatic Analysis
Flag this post
Engineering a Rust optimization quiz
๐ฌStatic Analysis
Flag this post
DPO-F+: Aligning Code Repair Feedback with Developers' Preferences
arxiv.orgยท12h
๐ฌStatic Analysis
Flag this post
I Processed the Internet on a Single Machine to Find Valuable Expired Domains
โฑ๏ธComputational Complexity
Flag this post
PostgreSQL update 17 to 18: changed default of database checksum: upgrade_pg.sh
๐ปprogramming
Flag this post
PAINT25 Invited Talk transcript: โNotational Freedom via Self-Raising Diagramsโ
programmingmadecomplicated.wordpress.comยท5h
๐ฌStatic Analysis
Flag this post
9001/copyparty v1.19.20
github.comยท2d
๐จComputer Graphics
Flag this post
Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns
forbes.comยท2d
โฑ๏ธComputational Complexity
Flag this post
SesameOp: New backdoor exploits OpenAI API for covert C2
securityaffairs.comยท47m
๐ปprogramming
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
๐๏ธDesign Patterns
Flag this post
Probing Knowledge Holes in Unlearned LLMs
arxiv.orgยท12h
๐Dynamic Programming
Flag this post
AMD "Zen 5" RDSEED Bug Threatens Cryptographic Key Generation
techpowerup.comยท1d
๐ณRed-Black Trees
Flag this post
Q&A #80 (2025-10-31)
computerenhance.comยท3d
๐ฌStatic Analysis
Flag this post
Apple reveals a host of iOS and iPadOS security flaws needing urgent attention - so patch now
techradar.comยท5h
โฑ๏ธComputational Complexity
Flag this post
Loading...Loading more...