So you want to organize an Internet Yami-Ichi
yami-ichi.bizยท1hยท
Discuss: Hacker News
โšกTokio
Flag this post
AI-Powered Semantic Search in Symfony Using PHP and OpenAI Embeddings
phpcmsframework.comยท11hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Hackers are abusing a Google OAuth endpoint to hijack user sessions (2024)
itbrew.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Workload Identity in a Multi System Environment (Wimse) Architecture
datatracker.ietf.orgยท4dยท
Discuss: Hacker News
๐Ÿ—„Back-end
Flag this post
Test and Measurement Strategies for QKD, PQC and Hybrid Systems
eetimes.comยท3h
โ„๏ธNix Language
Flag this post
Poisoned pixels: New AI tool to fight malicious deepfake images
techxplore.comยท7h
๐Ÿฆ€Rust
Flag this post
Imperative to Relational
madhadron.comยท1dยท
๐Ÿ˜PostgreSQL
Flag this post
Hardware security on old devices
discuss.privacyguides.netยท2h
๐ŸงLinux
Flag this post
Ask HN: I know how to build it, now I want to break it
news.ycombinator.comยท2dยท
Discuss: Hacker News
โ„๏ธNix Language
Flag this post
11 AWS Security Best Practices You Must Implement Now
dev.toยท3hยท
Discuss: DEV
๐Ÿ—„Back-end
Flag this post
Louvre Heist Exposes Cyber Physical Security Flaws and Fixes
windowsforum.comยท2d
๐Ÿ—„Back-end
Flag this post
How to find Monsta FTP installations on your network
runzero.comยท3h
โ„๏ธNix Language
Flag this post
Sloppy : Chrome Extension for AI Slop Detection with Agentic Postgres
github.comยท20hยท
Discuss: DEV
๐Ÿ—„Back-end
Flag this post
Microsoft finds security flaw in AI chatbots that could expose conversation topics
techxplore.comยท7h
โ„๏ธNix Language
Flag this post
How I Used WireGuard to Secure API Communication Between Cloud Servers โ€” Plus a PyAirbyte Custom Connector Tutorial
dev.toยท6hยท
Discuss: DEV
๐Ÿ—„Back-end
Flag this post
Getting Started With Queryable Encryption With the MongoDB EF Core Provider
dev.toยท1dยท
Discuss: DEV
โ„๏ธNix Language
Flag this post
Trump OLC On Boat Strikes: The Less Of A Threat Posed By Boat Occupants, The More Justified We Are In Murdering Them
techdirt.comยท8h
๐Ÿฆ€Rust
Flag this post
Account Takeover via IDOR: From UserID to Full Access
infosecwriteups.comยท1d
๐Ÿ—„Back-end
Flag this post
A proposed kernel policy for LLM-generated contributions
lwn.netยท1d
โ„๏ธNix Language
Flag this post
TP-Link Routers May Get Banned in US Due to Alleged Links With China
blogger.comยท16h
๐Ÿ—„Back-end
Flag this post