Tre — PG Play Writeup
infosecwriteups.com·2d
📄Static Sites
Flag this post
D.J. Bernstein: The Good News Archive
⚡Zig
Flag this post
A Short Survey of Compiler Backends
⚙️LLVM
Flag this post
Reflections on Trusting Trust (1984)
⚡Zig
Flag this post
Stay Ahead: Essential Technology News for Today’s Innovations
ipv6.net·20h
🧠AI
Flag this post
New malware uses AI to adapt during attacks, report finds
therecord.media·3h
📱Edge AI
Flag this post
CampusGuard & VO Form Strategic Partnership to Expand in the U.S.
prnewswire.com·19h
⛓️Blockchain
Flag this post
Why core security controls for vibe coding are critical
reversinglabs.com·1d
📱Edge AI
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.com·20h
⚡Zig
Flag this post
Akamai Research: AI Bots Threaten the Foundation of Web-Based Business Models
prnewswire.com·1d
💬NLP
Flag this post
Let's Get Physical: A New Convergence for Electrical Grid Security
darkreading.com·2d
🏗️Systems Design
Flag this post
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes
theregister.com·3h
📱Edge AI
Flag this post
I've created a leetcode for system design
⚡Zig
Flag this post
Can low-altitude mobility enhance the resilience of urban public transportation systems?
sciencedirect.com·2h
🏗️Systems Design
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.com·5h
🔧Embedded Rust
Flag this post
[TUI] Ricing the original Rogue
🔧Embedded Rust
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
⚙️LLVM
Flag this post
Loading...Loading more...